Page 26 of 317 results (0.003 seconds)

CVSS: 7.5EPSS: 30%CPEs: 42EXPL: 0

Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required. Desbordamiento de búfer en el Bloque de Mensajes de Servidor (SMB) en Microsoft Windows XP, 2000 y NT permite a atacantes remotos causar la Denegación de Servicios (DoS) y posiblemente ejecutar código arbitrario mediante un paquete SMB que especifica una longitud de búfer menor que la requerida. • http://secunia.com/advisories/9225 http://securitytracker.com/id?1007154 http://www.kb.cert.org/vuls/id/337764 http://www.securityfocus.com/bid/8152 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-024 https://exchange.xforce.ibmcloud.com/vulnerabilities/12544 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A118 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A146 https://oval.cisecurity.org •

CVSS: 7.5EPSS: 15%CPEs: 10EXPL: 1

Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag. Desbordamiento de búfer en el Convertidor HTML (HTML32.cnv) de varios sistemas operativos Windows, permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario mediante una operación de cortar-y-pegar, como se ha demostrado en Internet Explorer 5.0 usando un arguemento "align" larga en una etiqueta HR. • https://www.exploit-db.com/exploits/22824 http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006155.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-June/006067.html http://marc.info/?l=bugtraq&m=105639925122961&w=2 http://www.cert.org/advisories/CA-2003-14.html http://www.kb.cert.org/vuls/id/823260 http://www.securityfocus.com/bid/8016 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-023 •

CVSS: 5.0EPSS: 95%CPEs: 2EXPL: 1

The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request. La librería nsisslog.dll de la extensión ISAPI de Microsoft Winodws Media Services en Windows NT 4.0 y 2000 permite que atacante remotos provoquen una denegación de servicio en el Internet Information Server (IIS) mediante una cierta petición de red. • https://www.exploit-db.com/exploits/56 http://marc.info/?l=bugtraq&m=105427615626177&w=2 http://marc.info/?l=ntbugtraq&m=105421127531558&w=2 http://marc.info/?l=ntbugtraq&m=105421176432011&w=2 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-019 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A936 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A966 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.6EPSS: 0%CPEs: 45EXPL: 0

Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger. Desbordamiento de búfer en el Kernel de Windows permite a usuarios locales ganar privilegios haciendo que ciertos mensajes de error sean pasados a un depurador. • http://www.kb.cert.org/vuls/id/446338 http://www.securityfocus.com/bid/7370 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-013 https://exchange.xforce.ibmcloud.com/vulnerabilities/11803 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1264 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A142 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2022 https://oval •

CVSS: 5.0EPSS: 44%CPEs: 45EXPL: 5

The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference. La pila DCE-RPC en Windows 2000 y otros sistemas operativos permite a atacantes remotos causar una denegación de servicio (desactivar el servico RCP) mediante un paquete malformado al puerto TCP 135, que dispara una desreferencia a un puntero nulo. • https://www.exploit-db.com/exploits/21951 https://www.exploit-db.com/exploits/21953 https://www.exploit-db.com/exploits/21954 https://www.exploit-db.com/exploits/21952 http://www.kb.cert.org/vuls/id/261537 http://www.securityfocus.com/archive/1/296114/2002-10-14/2002-10-20/0 http://www.securityfocus.com/bid/6005 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-010 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •