Page 24 of 317 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 49EXPL: 2

Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application. Desbordamiento de búfer en User32.dll en Windows NT a Server 2003 permite a usaurios locales ejcutar código arbitrario mediante mensajes grandes a controles: LB_DIR a ListBox o CB_DIR a ComboBox; en una operación privilegiada. • https://www.exploit-db.com/exploits/23255 https://www.exploit-db.com/exploits/122 http://marc.info/?l=bugtraq&m=106631999907035&w=2 http://marc.info/?l=ntbugtraq&m=106632111408343&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/967668 http://www.securityfocus.com/bid/8827 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-045 https://exchange.xforce.ibmcloud.com/vulnerabilities/13424 https://oval.cisecur •

CVSS: 7.5EPSS: 97%CPEs: 48EXPL: 5

The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack. El servicio de mensajería de Windows NT a Server 2003 no verifica adecuadamente la longitud del mensaje, lo que permite a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/385 https://www.exploit-db.com/exploits/111 https://www.exploit-db.com/exploits/135 https://www.exploit-db.com/exploits/23247 http://marc.info/?l=bugtraq&m=106666713812158&w=2 http://marc.info/?l=ntbugtraq&m=106632188709562&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/575892 http://www.securityfocus.com/bid/8826 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003 •

CVSS: 7.5EPSS: 13%CPEs: 49EXPL: 0

The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers to execute arbitrary code without user approval. La capacidad Authenticode en Microsoft Windows NT hasta Server 2003 no pide al usuario confirmación para descargar e instalar controles ActiveX cuanto el sistema está bajo de memoria, lo que podría permitir a atacantes remotos ejecutar código arbitrario sin aprovación del usuario. • http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/838572 http://www.securityfocus.com/bid/8830 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-041 https://exchange.xforce.ibmcloud.com/vulnerabilities/13422 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A185 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A198 •

CVSS: 7.5EPSS: 53%CPEs: 48EXPL: 0

Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL. Desbordamiento de búfer en la pila en el sistema PCHealht en el Centro de Ayuda y Soporte de Windows XP y Windows 2003 Server permite a atacantes remotos ejecutar código arbitrario mediante una petición larga en la URL HCP. • http://marc.info/?l=bugtraq&m=106631908105696&w=2 http://marc.info/?l=ntbugtraq&m=106632194809632&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/467036 http://www.ngssoftware.com/advisories/ms-pchealth.txt http://www.securityfocus.com/bid/8828 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-044 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A217 https://oval.cisecurity •

CVSS: 5.1EPSS: 67%CPEs: 10EXPL: 0

A multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities. Una condición de carrera entre hebras de ejecución el la funcionalidad RPC DCOM de Windows con el parche MS03-039 instalado permite a atacantes remotos causar una denegación de servicio (caída o reinicio) haciendo que dos hebras procesen la misma petición RPC, lo que hace que una use memoria después de que haya sido liberada, una vulnerabilidad distinta de CAN-2003-0352 (Blaster/Nachi), CAN-2003-0715, y CAN-2003-0528, and que ha sido demostrada por ciertos "exploits" contra estas vulnerabilidades. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011870.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011886.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011901.html http://marc.info/?l=bugtraq&m=106579825211708&w=2 http://marc.info/?l=bugtraq&m=106588827513795&w=2 http://marc.info/?l=ntbugtraq&m=106580303918155&w=2 http://www.kb.cert.org/vuls/id/547820 http://www.securityfocus.com/bid/8811 http://www • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •