Page 15 of 104 results (0.008 seconds)

CVSS: 9.3EPSS: 56%CPEs: 4EXPL: 0

Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2, and SP1 provides the MicrosoftClient.jar file containing a signed Java applet, which allows remote attackers to execute arbitrary code on client machines via unspecified vectors, aka "Poisoned Cup of Code Execution Vulnerability." Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2 y SP1 incluye el archivo MicrosoftClient.jar que contiene un applet de Java firmado, lo que permite a atacantes remotos ejecutar código de su elección en las máquinas clientes a través de vectores no especificados. También conocida como "Vulnerabilidad de ejecución de código de copa envenenada". • http://www.securityfocus.com/bid/49983 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-079 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13032 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.2EPSS: 0%CPEs: 45EXPL: 0

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability." Vulneravilidad de desreferencia a puntero nulo en win32k.sys en el controlador kernel-modeen en Microsoft Windows XP SP2 ySP3, Windows Server 2003 SP2, Windows Vista SP1 y SP2, Windows Server 2008 Gold, SP2, R2, y R2 SP1, y Windows 7 Gold y SP1, permite a usuarios locales obtener privilegios a través de aplicaciones manipuladas lanzan un desreferencia a puntero nulo. Vulnerabilidad distinta de "Vulnerabilidad tipo 2" listada en los CVEs en MS11-034, también conocida como "Win32k Null Pointer De-reference Vulnerability." • http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx http://osvdb.org/71735 http://secunia.com/advisories/44156 http://support.avaya.com/css/P8/documents/100133352 http://www.securityfocus.com/bid/47229 http://www.securitytracker.com/id?1025345 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0952 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011 • CWE-476: NULL Pointer Dereference •

CVSS: 9.3EPSS: 95%CPEs: 18EXPL: 1

Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, does not properly validate memory allocation for internal data structures, which allows remote attackers to execute arbitrary code, possibly via a large CacheSize property that triggers an integer wrap and a buffer overflow, aka "ADO Record Memory Vulnerability." NOTE: this might be a duplicate of CVE-2010-1117 or CVE-2010-1118. Microsoft Data Access Components (MDAC) versión 2.8 SP1 y SP2 y Windows Data Access Components (WDAC) versión 6.0 no valida apropiadamente la asignación de memoria para las estructuras de datos internas, lo que permite a los atacantes remotos ejecutar código arbitrario, posiblemente por medio de una propiedad CacheSize larga que desencadena un ajuste de enteros y un desbordamiento del búfer, también se conoce como "ADO Record Memory Vulnerability" Nota: este CVE podría ser un duplicado de CVE-2010-1117 o CVE-2010-1118. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. This vulnerability was submitted to the ZDI via at the annual Pwn2Own competition at CanSecWest. • https://www.exploit-db.com/exploits/15984 http://osvdb.org/70444 http://secunia.com/advisories/42804 http://support.avaya.com/css/P8/documents/100124846 http://vreugdenhilresearch.nl/ms11-002-pwn2own-heap-overflow http://www.securityfocus.com/bid/45698 http://www.securitytracker.com/id?1024947 http://www.us-cert.gov/cas/techalerts/TA11-011A.html http://www.vupen.com/english/advisories/2011/0075 http://www.zerodayinitiative.com/advisories/ZDI-11-002 https://docs.microsoft. • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 89%CPEs: 18EXPL: 0

Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability." Error en la propiedad signedness de enteros en la función SQLConnectW en una API de ODBC (odbc32.dll) en Microsoft Data Access Components (MDAC) versión 2.8 SP1 y SP2, y Windows Data Access Components (WDAC) versión 6.0, permite a los atacantes remotos ejecutar código arbitrario por medio de una cadena larga en el Nombre de Origen de Datos (DSN) y un argumento szDSN creado, que omite una comparación firmada y conduce a un desbordamiento del búfer, también se conoce como "DSN Overflow Vulnerability". This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Data Access Components. The vulnerability is present in an API call and as such successful exploitation will depend on an application's implementation of this call. The specific flaw exists within the SQLConnectW call in the odbc32.dll component. When calculating the size of a user provided szDSN, the result of a call to lstrlenW is used in a signed comparison to SQL_MAX_DSN_LENGTH to verify the destination buffer size. • http://osvdb.org/70443 http://secunia.com/advisories/42804 http://support.avaya.com/css/P8/documents/100124846 http://www.securityfocus.com/bid/45695 http://www.securitytracker.com/id?1024947 http://www.us-cert.gov/cas/techalerts/TA11-011A.html http://www.vupen.com/english/advisories/2011/0075 http://www.zerodayinitiative.com/advisories/ZDI-11-001 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-002 https://oval.cisecurity.org/repository/search/def • CWE-189: Numeric Errors •

CVSS: 5.8EPSS: 88%CPEs: 3EXPL: 0

Open redirect vulnerability in the web interface in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, and 2010 Update 2 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors, aka "UAG Redirection Spoofing Vulnerability." Vulnerabilidad de redirección abierta en el interfaz web de Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, and 2010 Update 2, permite a atacantes remotos redirigir a usuarios a paginas web de su elección y llevar a cabo ataques de suplantación de identidad (phishing) a través de vectores sin especificar, también conocido como "UAG Redirection Spoofing Vulnerability." • http://www.us-cert.gov/cas/techalerts/TA10-313A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-089 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12257 • CWE-20: Improper Input Validation •