CVE-2011-1896
https://notcve.org/view.php?id=CVE-2011-1896
Cross-site scripting (XSS) vulnerability in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, Update 1, Update 2, and SP1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "ExcelTable Reflected XSS Vulnerability." Vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en Microsoft Access Gateway Forefront Unificado (UAG) 2010 Gold, Update 1, Update 2 y SP1 permite a atacantes remotos inyectar secuencias de comandos web o HTML a través de vectores no especificados. También conocida como "vulnerabilidad XSS de tabla de Excel reflejada". • http://osvdb.org/76233 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-079 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12197 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2011-1229
https://notcve.org/view.php?id=CVE-2011-1229
win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 allows local users to gain privileges via a crafted application that triggers a NULL pointer dereference, a different vulnerability than other "Vulnerability Type 2" CVEs listed in MS11-034, aka "Win32k Null Pointer De-reference Vulnerability." Vulneravilidad de desreferencia a puntero nulo en win32k.sys en el controlador kernel-modeen en Microsoft Windows XP SP2 ySP3, Windows Server 2003 SP2, Windows Vista SP1 y SP2, Windows Server 2008 Gold, SP2, R2, y R2 SP1, y Windows 7 Gold y SP1, permite a usuarios locales obtener privilegios a través de aplicaciones manipuladas lanzan un desreferencia a puntero nulo. Vulnerabilidad distinta de "Vulnerabilidad tipo 2" listada en los CVEs en MS11-034, también conocida como "Win32k Null Pointer De-reference Vulnerability." • http://blogs.technet.com/b/srd/archive/2011/04/12/ms11-034-addressing-vulnerabilities-in-the-win32k-subsystem.aspx http://osvdb.org/71735 http://secunia.com/advisories/44156 http://support.avaya.com/css/P8/documents/100133352 http://www.securityfocus.com/bid/47229 http://www.securitytracker.com/id?1025345 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0952 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011 • CWE-476: NULL Pointer Dereference •
CVE-2011-0027 – Microsoft Internet Explorer MSADO CacheSize Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-0027
Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, does not properly validate memory allocation for internal data structures, which allows remote attackers to execute arbitrary code, possibly via a large CacheSize property that triggers an integer wrap and a buffer overflow, aka "ADO Record Memory Vulnerability." NOTE: this might be a duplicate of CVE-2010-1117 or CVE-2010-1118. Microsoft Data Access Components (MDAC) versión 2.8 SP1 y SP2 y Windows Data Access Components (WDAC) versión 6.0 no valida apropiadamente la asignación de memoria para las estructuras de datos internas, lo que permite a los atacantes remotos ejecutar código arbitrario, posiblemente por medio de una propiedad CacheSize larga que desencadena un ajuste de enteros y un desbordamiento del búfer, también se conoce como "ADO Record Memory Vulnerability" Nota: este CVE podría ser un duplicado de CVE-2010-1117 o CVE-2010-1118. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. This vulnerability was submitted to the ZDI via at the annual Pwn2Own competition at CanSecWest. • https://www.exploit-db.com/exploits/15984 http://osvdb.org/70444 http://secunia.com/advisories/42804 http://support.avaya.com/css/P8/documents/100124846 http://vreugdenhilresearch.nl/ms11-002-pwn2own-heap-overflow http://www.securityfocus.com/bid/45698 http://www.securitytracker.com/id?1024947 http://www.us-cert.gov/cas/techalerts/TA11-011A.html http://www.vupen.com/english/advisories/2011/0075 http://www.zerodayinitiative.com/advisories/ZDI-11-002 https://docs.microsoft. • CWE-20: Improper Input Validation •
CVE-2011-0026 – Microsoft Data Access Components DSN Overflow Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2011-0026
Integer signedness error in the SQLConnectW function in an ODBC API (odbc32.dll) in Microsoft Data Access Components (MDAC) 2.8 SP1 and SP2, and Windows Data Access Components (WDAC) 6.0, allows remote attackers to execute arbitrary code via a long string in the Data Source Name (DSN) and a crafted szDSN argument, which bypasses a signed comparison and leads to a buffer overflow, aka "DSN Overflow Vulnerability." Error en la propiedad signedness de enteros en la función SQLConnectW en una API de ODBC (odbc32.dll) en Microsoft Data Access Components (MDAC) versión 2.8 SP1 y SP2, y Windows Data Access Components (WDAC) versión 6.0, permite a los atacantes remotos ejecutar código arbitrario por medio de una cadena larga en el Nombre de Origen de Datos (DSN) y un argumento szDSN creado, que omite una comparación firmada y conduce a un desbordamiento del búfer, también se conoce como "DSN Overflow Vulnerability". This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Data Access Components. The vulnerability is present in an API call and as such successful exploitation will depend on an application's implementation of this call. The specific flaw exists within the SQLConnectW call in the odbc32.dll component. When calculating the size of a user provided szDSN, the result of a call to lstrlenW is used in a signed comparison to SQL_MAX_DSN_LENGTH to verify the destination buffer size. • http://osvdb.org/70443 http://secunia.com/advisories/42804 http://support.avaya.com/css/P8/documents/100124846 http://www.securityfocus.com/bid/45695 http://www.securitytracker.com/id?1024947 http://www.us-cert.gov/cas/techalerts/TA11-011A.html http://www.vupen.com/english/advisories/2011/0075 http://www.zerodayinitiative.com/advisories/ZDI-11-001 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-002 https://oval.cisecurity.org/repository/search/def • CWE-189: Numeric Errors •
CVE-2010-2734
https://notcve.org/view.php?id=CVE-2010-2734
Cross-site scripting (XSS) vulnerability in the mobile portal in Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, and 2010 Update 2 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "XSS Issue on UAG Mobile Portal Website in Forefront Unified Access Gateway Vulnerability." Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en el el portal móvil de Microsoft Forefront Unified Access Gateway (UAG) 2010 Gold, 2010 Update 1, y 2010 Update 2 permite a los atacantes remotos inyectar código web o HTML a su elección a través de vectores no especificados, también conocido como "XSS Issue on UAG Mobile Portal Website in Forefront Unified Access Gateway Vulnerability". • http://www.us-cert.gov/cas/techalerts/TA10-313A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-089 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12058 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •