Page 22 of 317 results (0.011 seconds)

CVSS: 7.6EPSS: 10%CPEs: 4EXPL: 0

Buffer overflow in the rendering for (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, and XP SP1 allows remote attackers to execute arbitrary code via a malformed WMF or EMF image. Desbordamiento de búfer en el dibujado de los formatos de imagen (1) Windows Metafile (WMF) o (2) Enhanced Metafile (EMF) en Microsoft Windows NT 4.0 SP6a, 2000 SP2 a SP4, y XP SP1 permite a atacantes remotos ejecutar código arbitrario mediante una imagen WMF o EMF malformada. • http://www.kb.cert.org/vuls/id/547028 http://www.securityfocus.com/bid/10120 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1064 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A897 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A959 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 1

The NtSetLdtEntries function in the programming interface for the Local Descriptor Table (LDT) in Windows NT 4.0 and Windows 2000 allows local attackers to gain access to kernel memory and execute arbitrary code via an expand-down data segment descriptor descriptor that points to protected memory. La función NtSetLdtEntries en el interfaz de programación de la Tabla de Descriptores L ocales (LDT) de Windows NT 4.0 y Windows 2000 permitea atacantes locales ganar acceso a memoria del kernel y ejecutar código de su elección mediante un cierto tipo descriptor de segmento de datos que apunta a memoria protegida. • https://www.exploit-db.com/exploits/23989 http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020068.html http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.eeye.com/html/Research/Advisories/AD20040413D.html http://www.kb.cert.org/vuls/id/122076 http://www.securityfocus.com/bid/10122 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com&#x •

CVSS: 7.2EPSS: 2%CPEs: 2EXPL: 0

The component for the Virtual DOS Machine (VDM) subsystem in Windows NT 4.0 and Windows 2000 does not properly validate system structures, which allows local users to access protected kernel memory and execute arbitrary code. El componente del subsistema de la Máquina Virtual DOS (VDM) en Windows NT 4.0 y Windows 2000 no valida adecuadamente estructuras de sistema, lo que permite a usuarios locales acceder a memoria protegida del kernel y ejecutar código de su elección. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-April/020070.html http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.eeye.com/html/Research/Advisories/AD20040413E.html http://www.kb.cert.org/vuls/id/783748 http://www.securityfocus.com/bid/10117 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com/vulnerabilities/15714 https://oval.cisecurity.or •

CVSS: 2.6EPSS: 1%CPEs: 7EXPL: 0

The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability." El interfaz RPC DCOM de Microsoft Windows NT 4.0, 2000, XP y Server 2003 permite a atacantes remotos causar comunicaciones de red mediante una llamada de "alterar contexto" conteniendo datos adicionales, también conocida como "Vulnerabilidad de Identidad de Objeto". • http://secunia.com/advisories/11065 http://www.ciac.org/ciac/bulletins/o-115.shtml http://www.kb.cert.org/vuls/id/212892 http://www.securityfocus.com/bid/10121 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012 https://exchange.xforce.ibmcloud.com/vulnerabilities/15711 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1041 https://oval.cisecurity.org/repository/ •

CVSS: 9.3EPSS: 96%CPEs: 34EXPL: 0

The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. El Servicio de Nombres de Internet de Windows (WINS) en Microsoft Windows Server 2003, y posiblemente Windows NT y Server 2000 no valida adecuadamente la longitud de ciertos paquetes, lo que permite a ciertos paquetes causar una denegación de servicio y posiblemente ejecutar código arbitrario. • http://www.ciac.org/ciac/bulletins/o-077.shtml http://www.kb.cert.org/vuls/id/445214 http://www.osvdb.org/3903 http://www.securityfocus.com/bid/9624 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-006 https://exchange.xforce.ibmcloud.com/vulnerabilities/15037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A704 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A800 https://oval.c • CWE-20: Improper Input Validation •