Page 19 of 317 results (0.011 seconds)

CVSS: 10.0EPSS: 7%CPEs: 22EXPL: 0

Heap-based buffer overflow in the Hrtbeat.ocx (Heartbeat) ActiveX control for Internet Explorer 5.01 through 6, when users who visit online gaming sites that are associated with MSN, allows remote attackers to execute arbitrary code via the SetupData parameter. • http://marc.info/?l=bugtraq&m=110616221411579&w=2 http://www.kb.cert.org/vuls/id/673134 http://www.ngssoftware.com/advisories/heartbeatfull.txt http://www.securityfocus.com/bid/11367 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 https://exchange.xforce.ibmcloud.com/vulnerabilities/17714 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 14%CPEs: 5EXPL: 2

Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow. Los servicios Network Dynamic Data Exchange (NetDDE) de Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 permiten a atacantes ejecutar código de su elección remotamente o ganar privilegios localmente mediante un mensaje o aplicación maliciosos que envuelve un "búfer sin comprobar", posiblemente un desbordamiento de búfer. • https://www.exploit-db.com/exploits/16371 https://www.exploit-db.com/exploits/734 http://marc.info/?l=bugtraq&m=109786703930674&w=2 http://secunia.com/advisories/12803 http://www.kb.cert.org/vuls/id/640488 http://www.securityfocus.com/bid/11372 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031 https://exchange.xforce.ibmcloud.com/vulnerabilities/16556 https://exchange.xforce.ibmcloud.com/vulnerabilities/17657 https://oval.cisecurity.org/repository&#x •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

"Shatter" style vulnerability in the Window Management application programming interface (API) for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to gain privileges by using certain API functions to change properties of privileged programs using the SetWindowLong and SetWIndowLongPtr API functions. Vulnerabilidad de estilo "hacer añicos" en la interfaz de programación de aplicación (API) de Administración de Windows en Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 permite a usuarios locales ganar privilegios usando ciertas funciones de API para cambiar las propiedades de programas privilegiados usando las funciones de API SetWindowLong y SetWIndowLongPtr. • http://marc.info/?l=bugtraq&m=109777417922695&w=2 http://www.kb.cert.org/vuls/id/218526 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/16579 https://exchange.xforce.ibmcloud.com/vulnerabilities/17658 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

The Virtual DOS Machine (VDM) subsystem of Microsoft Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to access kernel memory and gain privileges via a malicious program that modified some system structures in a way that is not properly validated by privileged operating system functions. El subsistema de Máquina Virtual DOS de Microsoft Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 permite a usuarios locales acceder a memoria del kernel y ganar privilegios mediante un programa malicioso que modifica ciertas estructuras de sistema de manera que no es validado adecuadamente por funciones privilegiadas del sistema operativo. • http://marc.info/?l=bugtraq&m=109772135404427&w=2 http://www.kb.cert.org/vuls/id/910998 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/16580 https://exchange.xforce.ibmcloud.com/vulnerabilities/17658 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1751 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3161 https://oval.cisecurity.org/re •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

The RPC Runtime Library for Microsoft Windows NT 4.0 allows remote attackers to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values. La librería de tiempo de ejecución RPC de Microsoft Windows NT 4.0 permite a atacantes remotos leer la memoria activa o causar una denegación de servicio (caída del sistema) mediante un mensaje malicioso, posiblemente relacionado con valores de longitud inapropiados. • http://marc.info/?l=bugtraq&m=109769394209518&w=2 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-029 https://exchange.xforce.ibmcloud.com/vulnerabilities/17646 https://exchange.xforce.ibmcloud.com/vulnerabilities/17663 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2505 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5277 •