Page 146 of 1003 results (0.008 seconds)

CVSS: 9.3EPSS: 93%CPEs: 28EXPL: 0

Microsoft Internet Explorer 5.01 SP4 and 6 does not properly handle errors associated with access to uninitialized memory, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "HTML Objects Memory Corruption Vulnerability." Microsoft Internet Explorer 5.01 SP4 y 6 no gestiona correctamente los errores asociados con el acceso a memoria no inicializada, lo que permite a atacantes remotos ejecutar código de su elección mediante un documento HTML, también conocido como "HTML Objects Memory Corruption Vulnerability (Vulnerabilidad de Corrupción de Memoria de Objetos HTML)". • http://marc.info/?l=bugtraq&m=122479227205998&w=2 http://www.securityfocus.com/bid/31618 http://www.securitytracker.com/id?1021047 http://www.us-cert.gov/cas/techalerts/TA08-288A.html http://www.vupen.com/english/advisories/2008/2809 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-058 https://exchange.xforce.ibmcloud.com/vulnerabilities/45564 https://exchange.xforce.ibmcloud.com/vulnerabilities/45565 https://oval.cisecurity.org/repository/search/definition/ova • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 96%CPEs: 28EXPL: 0

Microsoft Internet Explorer 6 does not properly handle errors related to using the componentFromPoint method on xml objects that have been (1) incorrectly initialized or (2) deleted, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "Uninitialized Memory Corruption Vulnerability." Microsoft Internet Explorer 6 no maneja adecuadamente errores asociados con accesos a un objeto que ha sido (1) inicializado incorrectamente o (2) borrado, lo cual permite a atacantes remotos ejecutar código de su elección a través de un documento HTML manipulado, también conocido como "Vulnerabilidad de Corrupción de Memoria no iniciada". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific flaw exists in the componentFromPoint() method exposed through JavaScript. A problem in the implementation of this method for a particular object can be used to arbitrarily control memory access. • http://ifsec.blogspot.com/2008/10/internet-explorer-6-componentfrompoint.html http://marc.info/?l=bugtraq&m=122479227205998&w=2 http://www.securityfocus.com/archive/1/497380/100/0/threaded http://www.securityfocus.com/bid/31617 http://www.securitytracker.com/id?1021047 http://www.us-cert.gov/cas/techalerts/TA08-288A.html http://www.vupen.com/english/advisories/2008/2809 http://www.zerodayinitiative.com/advisories/ZDI-08-069 https://docs.microsoft.com/en-us/security-updates/ • CWE-908: Use of Uninitialized Resource •

CVSS: 7.1EPSS: 11%CPEs: 16EXPL: 4

srv.sys in the Server service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote attackers to cause a denial of service (system crash) or possibly have unspecified other impact via an SMB WRITE_ANDX packet with an offset that is inconsistent with the packet size, related to "insufficiently validating the buffer size," as demonstrated by a request to the \PIPE\lsarpc named pipe, aka "SMB Validation Denial of Service Vulnerability." SRV.sys en el servicio de servidor en Microsoft Windows versiones 2000 SP4, XP SP2 y SP3, Server 2003 SP1 y SP2, vista Gold y SP1, y Server 2008 permite a los atacantes remotos causar una denegación de servicio (bloqueo de sistema) o posiblemente tener otro impacto no especificado por medio de un paquete SMB WRITE_ANDX con un desplazamiento que es incompatible con el tamaño del paquete, relacionado con "insufficiently validating the buffer size", como fue demostrado por una petición a la tubería llamada \PIPE\lsarpc , también conocida como "SMB Validation Denial of Service Vulnerability" • https://www.exploit-db.com/exploits/6463 http://secunia.com/advisories/31883 http://www.reversemode.com/index.php?option=com_content&task=view&id=54&Itemid=1 http://www.securityfocus.com/archive/1/496354/100/0/threaded http://www.securityfocus.com/bid/31179 http://www.securitytracker.com/id?1020887 http://www.us-cert.gov/cas/techalerts/TA09-013A.html http://www.vallejo.cc/proyectos/vista_SMB_write_DoS.htm http://www.vupen.com/english/advisories/2008/2583 https:/ • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 6EXPL: 1

mDNSResponder in the Bonjour Namespace Provider in Apple Bonjour for Windows before 1.0.5 allows attackers to cause a denial of service (NULL pointer dereference and application crash) by resolving a crafted .local domain name that contains a long label. mDNSResponder de Bonjour Namespace Provider en Apple Bonjour para Windows versiones anteriores a la 1.0.5, permite a atacantes provocar una denegación de servicio (puntero NULO sin referencia y caída de aplicación) resolviendo un nombre de dominio .local manipulado que contiene una etiqueta larga.ñ • https://www.exploit-db.com/exploits/32350 http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html http://secunia.com/advisories/31822 http://support.apple.com/kb/HT2990 http://www.securityfocus.com/bid/31091 http://www.securitytracker.com/id?1020845 http://www.vupen.com/english/advisories/2008/2524 https://exchange.xforce.ibmcloud.com/vulnerabilities/45005 • CWE-20: Improper Input Validation •

CVSS: 6.4EPSS: 2%CPEs: 6EXPL: 0

mDNSResponder in Apple Bonjour for Windows before 1.0.5, when an application uses the Bonjour API for unicast DNS, does not choose random values for transaction IDs or source ports in DNS requests, which makes it easier for remote attackers to spoof DNS responses, a different vulnerability than CVE-2008-1447. mDNSResponder en Apple Bonjour para Windows anterior a 1.0.5, cuando una aplicación usa la API Bonjour para DNS unicast, no escoge valores aleatorios para las transacciones IDs u origen de puertos en las peticiones DNS, lo que facilita a atacantes remotos falsear las respuestas DNS. Vulnerabilidad distinta de CVE-2008-1447. • http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html http://secunia.com/advisories/31822 http://support.apple.com/kb/HT2990 http://www.securityfocus.com/bid/31093 http://www.securitytracker.com/id?1020844 http://www.vupen.com/english/advisories/2008/2524 •