Page 25 of 637 results (0.005 seconds)

CVSS: 9.3EPSS: 68%CPEs: 11EXPL: 0

The Embedded OpenType (EOT) Font Engine (T2EMBED.DLL) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted name table in a data record that triggers an integer truncation and a heap-based buffer overflow, aka "Embedded OpenType Font Heap Overflow Vulnerability." El Motor de Fuente de Embedded OpenType (EOT) (T2EMBED. DLL) en Microsoft Windows versiones 2000 SP4, XP SP2 y SP3, Server 2003 SP2, vista Gold, SP1 y SP2, y Server 2008 Gold y SP2, permiten a los atacantes remotos ejecutar código arbitrario por medio de una tabla de nombres creada en un registro de datos que desencadena un truncamiento de enteros y un desbordamiento del búfer en la región heap de la memoria, también se conoce como "Embedded OpenType Font Heap Overflow Vulnerability" • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=811 http://osvdb.org/55842 http://www.securitytracker.com/id?1022543 http://www.us-cert.gov/cas/techalerts/TA09-195A.html http://www.vupen.com/english/advisories/2009/1887 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-029 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5457 • CWE-681: Incorrect Conversion between Numeric Types •

CVSS: 9.3EPSS: 49%CPEs: 16EXPL: 0

Integer overflow in the Embedded OpenType (EOT) Font Engine in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted name table, aka "Embedded OpenType Font Integer Overflow Vulnerability." Embedded OpenType (EOT) Font Engine en Microsoft Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP2, Vista Gold, SP1, y SP2, y Server 2008 Gold y SP2, permite a atacantes remotos ejecutar código de su elección a través de un nombre de tabla manipulado, también conocido como "Vulnerabilidad Embedded OpenType Font Integer Overflow". • http://www.securitytracker.com/id?1022543 http://www.us-cert.gov/cas/techalerts/TA09-195A.html http://www.vupen.com/english/advisories/2009/1887 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-029 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5678 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 52%CPEs: 10EXPL: 0

The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 performs updates to pointers without properly validating unspecified data values, which allows remote attackers to execute arbitrary code via a crafted QuickTime media file, aka "DirectX Pointer Validation Vulnerability." EL QuickTime Movie Parser Filter en quartz.dll en DirectShow en Microsoft DirectX v7.0 a la v9.0c sobre Windows 2000 SP4, Windows XP SP2 y SP3, y Windows Server 2003 SP2, realiza actualizaciones a punteros sin validar adecuadamente los valores de datos no especificados, lo que permite a atacantes remotos ejecutar código de su elección a través de un archivo "Quicktime media" manipulado, también conocido como "Vulnerabilidad de validación de Puntero en DirectX". • http://osvdb.org/55844 http://www.securityfocus.com/bid/35600 http://www.us-cert.gov/cas/techalerts/TA09-195A.html http://www.vupen.com/english/advisories/2009/1886 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5963 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 26%CPEs: 10EXPL: 0

The QuickTime Movie Parser Filter in quartz.dll in DirectShow in Microsoft DirectX 7.0 through 9.0c on Windows 2000 SP4, Windows XP SP2 and SP3, and Windows Server 2003 SP2 does not properly validate unspecified size fields in QuickTime media files, which allows remote attackers to execute arbitrary code via a crafted file, aka "DirectX Size Validation Vulnerability." EL QuickTime Movie Parser Filter en quartz.dll en DirectShow en Microsoft DirectX v7.0 a la v9.0c sobre Windows 2000 SP4, Windows XP SP2 y SP3, y Windows Server 2003 SP2, no valida adecuadamente el tamaño sin especificar de los campos en los archivos "Quicktime media", lo que permite a atacantes remotos ejecutar código de su elección a través de un archivo manipulado, también conocido como "Vulnerabilidad de validación de tamaño en DirectX". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required in that a target must visit a malicious page or open a malicious video file. The specific flaw exists within the parsing of the length records of certain QuickTime atoms. The application implicitly trusts the length during a transformation which will lead to memory corruption and can be leveraged to execute arbitrary code under the context of the current user. • http://osvdb.org/55845 http://www.us-cert.gov/cas/techalerts/TA09-195A.html http://www.vupen.com/english/advisories/2009/1886 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-028 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6341 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 8%CPEs: 2EXPL: 1

The WebDAV extension in Microsoft Internet Information Services (IIS) 5.0 on Windows 2000 SP4 does not properly decode URLs, which allows remote attackers to bypass authentication, and possibly read or create files, via a crafted HTTP request, aka "IIS 5.0 WebDAV Authentication Bypass Vulnerability," a different vulnerability than CVE-2009-1535. La extension WebDAV en Microsoft Internet Information Services (IIS) v5.0 on Windows 2000 SP4 no decodifica adecuadamente las URLs, lo que permite a atacantes remotos evitar la autenticación, y posiblemente leer o crear ficheros, a través de una petición HTTP manipulada, también conocido como "Vulnerabilidad para evitar la autenticación de WebDAV en IIS v5.0" • https://www.exploit-db.com/exploits/8806 http://www.attrition.org/pipermail/vim/2009-June/002192.html http://www.securityfocus.com/bid/35232 http://www.securitytracker.com/id?1022358 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http://www.vupen.com/english/advisories/2009/1539 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5861 • CWE-287: Improper Authentication •