Page 2 of 15 results (0.009 seconds)

CVSS: 5.0EPSS: 6%CPEs: 3EXPL: 0

Unspecified vulnerability in Microsoft Office Communications Server (OCS), Office Communicator, and Windows Live Messenger allows remote attackers to cause a denial of service (crash) via a crafted Real-time Transport Control Protocol (RTCP) receiver report packet. Vulnerabilidad inespecifica en Microsoft Office Communications Server (OCS), Office Communicator, y Windows Live Messenger que permite a atacantes remotos producir una denegacion de servicio (caida) a traves de la manipulacion de paquetes de reporte de receptor del protocolo Real-time Transport Control Protocol (RTCP). • http://www.securityfocus.com/bid/32341 http://www.securitytracker.com/id?1021294 http://www.voipshield.com/research-details.php?id=132 https://exchange.xforce.ibmcloud.com/vulnerabilities/46670 •

CVSS: 10.0EPSS: 72%CPEs: 2EXPL: 0

An ActiveX control (Messenger.UIAutomation.1) in Windows Messenger 4.7 and 5.1 is marked as safe-for-scripting, which allows remote attackers to control the Messenger application, and "change state," obtain contact information, and establish audio or video connections without notification via unknown vectors. Un control ActiveX (Messenger.UIAutomation.1) en Windows Messenger versiones 4.7 y 5.1, es marcado como seguro para scripting, lo que permite a los atacantes remotos controlar la aplicación Messenger y "change state", obtener información de contacto, y establecer conexiones de audio o vídeo sin notificación por medio de vectores desconocidos. • http://marc.info/?l=bugtraq&m=121915960406986&w=2 http://secunia.com/advisories/31446 http://www.securityfocus.com/archive/1/495467/100/0/threaded http://www.securityfocus.com/bid/30551 http://www.securitytracker.com/id?1020681 http://www.us-cert.gov/cas/techalerts/TA08-225A.html http://www.vupen.com/english/advisories/2008/2354 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-050 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg&# • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 4.3EPSS: 8%CPEs: 1EXPL: 0

Buffer overflow in the GDI engine in Windows Live Messenger, as used for Windows MSN Live 8.1, allows user-assisted remote attackers to cause a denial of service (application crash or system crash) and possibly execute arbitrary code by placing a malformed file in a new folder under the Sharing Folders path, and triggering a synchronize operation through the Windows MSN Live online service, possibly related to extended file attributes and possibly related to an incomplete fix for MS07-046, as demonstrated by a (1) .jpg, (2) .gif, (3) .wmf, (4) .doc, or (5) .ico file. Desbordamiento de búfer en el motor GDI de Windows Live Messenger, tal y como se utiliza en MSN Live 8.1, permite a atacantes remotos con la complicidad del usuario provocar una denegación de servicio (caída de aplicación o caída del sistema) y posiblemente ejecutar código de su elección al situar un fichero malformado en una carpeta nueva bajo la ruta Carpetas Compartidas, y disparando una operación de sincronización a través del servicio en línea Windows MSN Live, posiblemente relativo a atributos de fichero extendidos y posiblemente relativo a un parche incompleto para MS07-046, como se demuestra con un fichero (1) .jpg, (2) .gif, (3) .wmf, (4) .doc, ó (5) .ico. • http://lostmon.blogspot.com/2007/09/windows-live-messenger-jpg-overflow.html http://osvdb.org/45523 http://www.securityfocus.com/bid/25795 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 95%CPEs: 4EXPL: 4

Heap-based buffer overflow in Microsoft MSN Messenger 6.2, 7.0, and 7.5, and Live Messenger 8.0 allows user-assisted remote attackers to execute arbitrary code via unspecified vectors involving video conversation handling in Web Cam and video chat sessions. Un desbordamiento de búfer en la región heap de la memoria en Microsoft MSN Messenger versiones 6.2, 7.0 y 7.5, y Live Messenger versión 8.0 permite a atacantes remotos asistidos por el usuario ejecutar código arbitrario por medio de vectores no especificados que involucran el manejo de conversación de video en Web Cam y sesiones de video chat. • https://www.exploit-db.com/exploits/30537 https://www.exploit-db.com/exploits/4334 http://osvdb.org/40126 http://secunia.com/advisories/26570 http://www.kb.cert.org/vuls/id/166521 http://www.securityfocus.com/bid/25461 http://www.securitytracker.com/id?1018622 http://www.team509.com/modules.php?name=News&file=article&sid=50 http://www.us-cert.gov/cas/techalerts/TA07-254A.html http://www.vupen.com/english/advisories/2007/2987 https://docs.microsoft.com/en&# • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 0

Microsoft MSN Messenger 4.7 on Windows XP allows remote attackers to cause a denial of service (resource consumption) via a flood of SIP INVITE requests to the port specified for voice conversation. Microsoft MSN Messenger 4.7 en Windows XP permite a atacantes remotos provocar una denegación de servicio (consumo de recursos) mediante una inundación de peticiones SIP INVITE al puerto especificado para conversación por voz. • http://osvdb.org/45427 http://www.sipera.com/index.php?action=resources%2Cthreat_advisory&tid=292& https://exchange.xforce.ibmcloud.com/vulnerabilities/35064 •