Page 16 of 86 results (0.015 seconds)

CVSS: 5.0EPSS: 7%CPEs: 8EXPL: 3

Microsoft Internet Explorer 6.0 on Windows NT 4.0 SP6a, Windows 2000 SP4, Windows XP SP1, Windows XP SP2, and Windows Server 2003 SP1 allows remote attackers to cause a denial of service (client crash) via a certain combination of a malformed HTML file and a CSS file that triggers a null dereference, probably related to rendering of a DIV element that contains a malformed IMG tag, as demonstrated by IEcrash.htm and IEcrash.rar. • https://www.exploit-db.com/exploits/26457 http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0673.html http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0127.html http://www.securityfocus.com/bid/15268 •

CVSS: 7.6EPSS: 96%CPEs: 9EXPL: 2

Unspecified vulnerability in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1, related to "An unchecked buffer" and possibly buffer overflows, allows remote attackers to execute arbitrary code via a crafted Windows Metafile (WMF) format image, aka "Windows Metafile Vulnerability." • https://www.exploit-db.com/exploits/1343 https://www.exploit-db.com/exploits/1346 http://secunia.com/advisories/17223 http://secunia.com/advisories/17461 http://secunia.com/advisories/17498 http://securityreason.com/securityalert/161 http://securitytracker.com/id?1015168 http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf http://www.eeye.com/html/research/advisories/AD20051108a.html http://www.eeye.com/html/research/advisories/AD20051108b.html http://www.kb.cert.org&#x •

CVSS: 7.5EPSS: 40%CPEs: 9EXPL: 1

Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. • https://www.exploit-db.com/exploits/1346 http://secunia.com/advisories/17223 http://secunia.com/advisories/17461 http://secunia.com/advisories/17498 http://securitytracker.com/id?1015168 http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf http://www.eeye.com/html/research/advisories/AD20051108b.html http://www.kb.cert.org/vuls/id/300549 http://www.securityfocus.com/bid/15352 http://www.us-cert.gov/cas/techalerts/TA05-312A.html http://www.vupen.com/english& •

CVSS: 7.5EPSS: 21%CPEs: 5EXPL: 0

The Client Service for NetWare (CSNW) on Microsoft Windows 2000 SP4, XP SP1 and Sp2, and Server 2003 SP1 and earlier, allows remote attackers to execute arbitrary code due to an "unchecked buffer" when processing certain crafted network messages. • http://secunia.com/advisories/17165 http://securitytracker.com/id?1015041 http://www.osvdb.org/19922 http://www.securityfocus.com/bid/15066 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-046 https://exchange.xforce.ibmcloud.com/vulnerabilities/21700 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1106 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1210 https://oval.cisecurity.org/repository/ •

CVSS: 7.5EPSS: 89%CPEs: 10EXPL: 0

Buffer overflow in Collaboration Data Objects (CDO), as used in Microsoft Windows and Microsoft Exchange Server, allows remote attackers to execute arbitrary code when CDOSYS or CDOEX processes an e-mail message with a large header name, as demonstrated using the "Content-Type" string. • http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0289.html http://marc.info/?l=bugtraq&m=112915118302012&w=2 http://secunia.com/advisories/17167 http://securitytracker.com/id?1015038 http://securitytracker.com/id?1015039 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ907245 http://www.kb.cert.org/vuls/id/883460 http://www.osvdb.org/19905 http://www.securityfocus.com/bid/15067 http://www.us-cert.gov/cas/techalerts/TA05-284A.html https:/ • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •