CVE-2005-1212
https://notcve.org/view.php?id=CVE-2005-1212
Buffer overflow in Microsoft Step-by-Step Interactive Training (orun32.exe) allows remote attackers to execute arbitrary code via a bookmark link file (.cbo, cbl, or .cbm extension) with a long User field. El desbordamiento de búfer en Microsoft Step-by-Step Interactive Training (orun32.exe) permite a los atacantes remotos ejecutar código arbitrario a través de un archivo de enlace de marcadores (extensión.cbo, cbl o.cbm) con un campo de usuario largo. • http://idefense.com/application/poi/display?id=262&type=vulnerabilities&flashstatus=true http://secunia.com/advisories/15669 http://securitytracker.com/id?1014194 http://www.securityfocus.com/bid/13944 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-031 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1224 •
CVE-2005-1794
https://notcve.org/view.php?id=CVE-2005-1794
Microsoft Terminal Server using Remote Desktop Protocol (RDP) 5.2 stores an RSA private key in mstlsapi.dll and uses it to sign a certificate, which allows remote attackers to spoof public keys of legitimate servers and conduct man-in-the-middle attacks. • http://secunia.com/advisories/15605 http://www.oxid.it/downloads/rdp-gbu.pdf http://www.securityfocus.com/bid/13818 https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12441 •
CVE-2003-0496 – Microsoft Windows Server 2000 - CreateFile API Named Pipe Privilege Escalation
https://notcve.org/view.php?id=CVE-2003-0496
Microsoft SQL Server before Windows 2000 SP4 allows local users to gain privileges as the SQL Server user by calling the xp_fileexist extended stored procedure with a named pipe as an argument instead of a normal file. Microsoft Windows 2000 pre-SP4 no maneja adecuadamente tuberias con nombre (named pipes) a través de la API CreateFile, de forma que usuarios locales pueden ganar privilegios llamando al procedimiento almacenado extendidoxp_fileexist de SQL Server con un nombre de tubería como argumento en vez de un fichero local. • https://www.exploit-db.com/exploits/22882 https://www.exploit-db.com/exploits/22883 http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0013.html http://marc.info/?l=bugtraq&m=105820282607865&w=2 http://marc.info/?l=bugtraq&m=105830986720243&w=2 http://www.atstake.com/research/advisories/2003/a070803-1.txt •
CVE-2003-0112
https://notcve.org/view.php?id=CVE-2003-0112
Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger. Desbordamiento de búfer en el Kernel de Windows permite a usuarios locales ganar privilegios haciendo que ciertos mensajes de error sean pasados a un depurador. • http://www.kb.cert.org/vuls/id/446338 http://www.securityfocus.com/bid/7370 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-013 https://exchange.xforce.ibmcloud.com/vulnerabilities/11803 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1264 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A142 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2022 https://oval •
CVE-2003-0111 – Microsoft Java Virtual Machine 3802 Series - Bytecode Verifier
https://notcve.org/view.php?id=CVE-2003-0111
The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Microsoft VM Could Enable System Compromise." El componente Verificador de ByteCode de la Máquina Virtual (VW) de Microsoft compilación 5.0.3809 y anteriores, usada en en Windows y en Internet Explorer, permite a atacantes remotos eludir comprobaciones de seguridad y ejecutar código arbitrario mediante un applet de Java malicioso, también conocido como "Fallo en Microsoft VW Podría Permitir Compromiso del Sistema" • https://www.exploit-db.com/exploits/22027 http://www.iss.net/security_center/static/11751.php http://www.kb.cert.org/vuls/id/447569 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-011 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A136 •