Page 2 of 24 results (0.002 seconds)

CVSS: 7.8EPSS: 1%CPEs: 4EXPL: 0

31 Dec 2002 — The terminal services screensaver for Microsoft Windows 2000 does not automatically lock the terminal window if the window is minimized, which could allow local users to gain access to the terminal server window. • http://online.securityfocus.com/archive/1/288415 •

CVSS: 7.5EPSS: 20%CPEs: 11EXPL: 0

23 Dec 2002 — The SMB signing capability in the Server Message Block (SMB) protocol in Microsoft Windows 2000 and Windows XP allows attackers to disable the digital signing settings in an SMB session to force the data to be sent unsigned, then inject data into the session without detection, e.g. by modifying group policy information sent from a domain controller. La capacidad de firmado en el protocolo Bloque de Mensaje de Servidor (SMB) en Microsoft Windows XP y Windows 2000 permite a atacantes desactivar la configuraci... • http://www.securityfocus.com/bid/6367 •

CVSS: 10.0EPSS: 7%CPEs: 43EXPL: 0

23 Dec 2002 — Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to execute arbitrary code by including a Java applet that invokes COM (Component Object Model) objects in a web site or an HTML mail. La Máquina Virtual de Microsoft (VM) hasta 5.0.3805 inclusive permite a atacantes remotos ejecutar código arbitrario incluyendo un applet de Java que invoca objetos COM (Component Object Model) en un sitio web o en un correo HTML. • http://www.securityfocus.com/bid/6371 •

CVSS: 9.1EPSS: 4%CPEs: 43EXPL: 0

23 Dec 2002 — The Java Database Connectivity (JDBC) APIs in Microsoft Virtual Machine (VM) 5.0.3805 and earlier allow remote attackers to bypass security checks and access database contents via an untrusted Java applet. Las APIs de conectividad de base de datos Java (JDBC) en Microsoft Virtual Machine (VM) 5.0.3805 y anteriores permiten a los atacantes remotos eludir las comprobaciones de seguridad y acceder al contenido de la base de datos a través de un applet Java no fiable. • http://www.ciac.org/ciac/bulletins/n-026.shtml •

CVSS: 5.0EPSS: 5%CPEs: 43EXPL: 0

23 Dec 2002 — Microsoft Virtual Machine (VM) build 5.0.3805 and earlier allows remote attackers to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability." Microsoft Virtual Machine (VM) build versión 5.0.3805 y anteriores permite a los atacantes remotos determinar el nombre de usuario de un usuario local a través de un applet de Java que accede a la propiedad del sistema user.dir, también conocida como "User.dir Exposure Vulnerability". • http://www.securityfocus.com/bid/6380 •

CVSS: 7.5EPSS: 1%CPEs: 43EXPL: 0

17 Dec 2002 — Two vulnerabilities in Microsoft Virtual Machine (VM) up to and including build 5.0.3805, as used in Internet Explorer and other applications, allow remote attackers to read files via a Java applet with a spoofed location in the CODEBASE parameter in the APPLET tag, possibly due to a parsing error. Dos vulnerabilidades en la Máquina Virtual de Microsoft (VM) hasta 5.0.3805 inclusive, como la usada en Internet Explorer y otras aplicaciones, permite a atacantes remotos leer ficheros mediante un applet Java co... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 10

04 Nov 2002 — NetDDE Agent on Windows NT 4.0, 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code as LocalSystem via "shatter" style attack by sending a WM_COPYDATA message followed by a WM_TIMER message, as demonstrated by GetAd, aka "Flaw in Windows WM_TIMER Message Handling Could Enable Privilege Elevation." El Agente NetDDE en sistemas Windows permite a usuarios locales ejecutar código arbitrario mediante un mensaje WM_COPYDATA usando un ataque de estilo "destrozar" ... • https://www.exploit-db.com/exploits/21922 •

CVSS: 9.8EPSS: 80%CPEs: 11EXPL: 1

28 Oct 2002 — Buffer overflow in Microsoft PPTP Service on Windows XP and Windows 2000 allows remote attackers to cause a denial of service (hang) and possibly execute arbitrary code via a certain PPTP packet with malformed control data. Desbordamiento de búfer en el servicio Microsoft PPTP en Windows XP y Windows 2000 permite a atacantes remotos causar una denegación de servicio (cuelgue) y posiblemente ejecutar código arbitrario mediante un cierto paquete PPTP. • https://packetstorm.news/files/id/180480 •

CVSS: 7.5EPSS: 20%CPEs: 14EXPL: 1

11 Oct 2002 — The Remote Data Protocol (RDP) version 5.1 in Microsoft Windows XP allows remote attackers to cause a denial of service (crash) when Remote Desktop is enabled via a PDU Confirm Active data packet that does not set the Pattern BLT command, aka "Denial of Service in Remote Desktop." • http://marc.info/?l=bugtraq&m=103235745116592&w=2 •

CVSS: 7.8EPSS: 21%CPEs: 46EXPL: 0

10 Oct 2002 — The HTML Help facility in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP uses the Local Computer Security Zone when opening .chm files from the Temporary Internet Files folder, which allows remote attackers to execute arbitrary code via HTML mail that references or inserts a malicious .chm file containing shortcuts that can be executed, aka "Code Execution via Compiled HTML Help File." • http://www.iss.net/security_center/static/10254.php •