Page 15 of 79 results (0.017 seconds)

CVSS: 7.2EPSS: 0%CPEs: 49EXPL: 2

Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application. Desbordamiento de búfer en User32.dll en Windows NT a Server 2003 permite a usaurios locales ejcutar código arbitrario mediante mensajes grandes a controles: LB_DIR a ListBox o CB_DIR a ComboBox; en una operación privilegiada. • https://www.exploit-db.com/exploits/23255 https://www.exploit-db.com/exploits/122 http://marc.info/?l=bugtraq&m=106631999907035&w=2 http://marc.info/?l=ntbugtraq&m=106632111408343&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/967668 http://www.securityfocus.com/bid/8827 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-045 https://exchange.xforce.ibmcloud.com/vulnerabilities/13424 https://oval.cisecur •

CVSS: 7.5EPSS: 97%CPEs: 48EXPL: 5

The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack. El servicio de mensajería de Windows NT a Server 2003 no verifica adecuadamente la longitud del mensaje, lo que permite a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/385 https://www.exploit-db.com/exploits/111 https://www.exploit-db.com/exploits/135 https://www.exploit-db.com/exploits/23247 http://marc.info/?l=bugtraq&m=106666713812158&w=2 http://marc.info/?l=ntbugtraq&m=106632188709562&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/575892 http://www.securityfocus.com/bid/8826 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003 •

CVSS: 7.5EPSS: 13%CPEs: 49EXPL: 0

The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers to execute arbitrary code without user approval. La capacidad Authenticode en Microsoft Windows NT hasta Server 2003 no pide al usuario confirmación para descargar e instalar controles ActiveX cuanto el sistema está bajo de memoria, lo que podría permitir a atacantes remotos ejecutar código arbitrario sin aprovación del usuario. • http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/838572 http://www.securityfocus.com/bid/8830 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-041 https://exchange.xforce.ibmcloud.com/vulnerabilities/13422 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A185 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A198 •

CVSS: 7.5EPSS: 53%CPEs: 48EXPL: 0

Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL. Desbordamiento de búfer en la pila en el sistema PCHealht en el Centro de Ayuda y Soporte de Windows XP y Windows 2003 Server permite a atacantes remotos ejecutar código arbitrario mediante una petición larga en la URL HCP. • http://marc.info/?l=bugtraq&m=106631908105696&w=2 http://marc.info/?l=ntbugtraq&m=106632194809632&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/467036 http://www.ngssoftware.com/advisories/ms-pchealth.txt http://www.securityfocus.com/bid/8828 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-044 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A217 https://oval.cisecurity •

CVSS: 10.0EPSS: 68%CPEs: 48EXPL: 0

Heap-based buffer overflow in the Distributed Component Object Model (DCOM) interface in the RPCSS Service allows remote attackers to execute arbitrary code via a malformed DCERPC DCOM object activation request packet with modified length fields, a different vulnerability than CVE-2003-0352 (Blaster/Nachi) and CVE-2003-0528. Desbordamiento de búfer basado en el montón en el interfaz DCOM (Distributed Component Object Model) del servicio RPCSS de Windows NT/2000/XP/2003 permite a atacantes remotos ejecutar código arbitrario mediante un paquete de petición de petición de activación de objeto DCERPC DCOM malformado, con campos de longitud modificados, una vulnerabilidad distinta de CAN-2003-0352 (Blaster/Nachi) y CAN-2003-0528. • http://marc.info/?l=bugtraq&m=106322856608909&w=2 http://www.cert.org/advisories/CA-2003-23.html http://www.kb.cert.org/vuls/id/483492 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-039 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1202 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1813 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A20 http •