Page 27 of 637 results (0.014 seconds)

CVSS: 4.9EPSS: 0%CPEs: 17EXPL: 1

The Windows Printing Service in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows local users to read arbitrary files via a crafted separator page, aka "Print Spooler Read File Vulnerability." Servicio de impresión de Windows en Microsoft Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP2, Vista Gold, SP1 y SP2, y Server 2008 SP2 permite a usuarios locales leer archivos arbitrarios a través de un separador de página elaborado, alias "Vulnerabilidad de lectura de archivo en cola de impresión". • https://github.com/zveriu/CVE-2009-0229-PoC http://osvdb.org/54933 http://secunia.com/advisories/35365 http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm http://www.securityfocus.com/bid/35208 http://www.securitytracker.com/id?1022352 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http://www.vupen.com/english/advisories/2009/1541 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 https://oval.cisecurity.org/repository/search • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.0EPSS: 0%CPEs: 17EXPL: 0

The Windows Print Spooler in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 allows remote authenticated users to gain privileges via a crafted RPC message that triggers loading of a DLL file from an arbitrary directory, aka "Print Spooler Load Library Vulnerability." La cola de impresión de Windows en Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, y SP2, y Server 2008 SP2 permite a usuraio autenticados remotamente obtener privilegios a través de un mensaje RCP manipulado que lanza la carga de un archivo DLL desde un directorio de su elección, también conocido como "Vulnerabilidad en la carga librería de la cola de impresión". • http://osvdb.org/54934 http://secunia.com/advisories/35365 http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm http://www.securityfocus.com/bid/35209 http://www.securitytracker.com/id?1022352 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http://www.vupen.com/english/advisories/2009/1541 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6287 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 64%CPEs: 1EXPL: 0

Stack-based buffer overflow in the EnumeratePrintShares function in Windows Print Spooler Service (win32spl.dll) in Microsoft Windows 2000 SP4 allows remote printer servers to execute arbitrary code via a crafted ShareName in a response to an RPC request, related to "printing data structures," aka "Buffer Overflow in Print Spooler Vulnerability." Desbordamiento de buffer basado en pila en la función EnumeratePrintShares en Windows Print Spooler Service (win32spl.dll) en Microsoft Windows 2000 SP4 permite a servidores de impresión remotos ejecutar código arbitrario a través de un ShareName manipulado en respuesta a una petición RPC, relacionado con "estructuras de datos impresos", también conocido como "Buffer Overflow in Print Spooler Vulnerability." • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=806 http://osvdb.org/54932 http://secunia.com/advisories/35365 http://support.avaya.com/elmodocs2/security/ASA-2009-217.htm http://www.securityfocus.com/bid/35206 http://www.securitytracker.com/id?1022352 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http://www.vupen.com/english/advisories/2009/1541 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-022 https://oval.cisecurity&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 10.0EPSS: 13%CPEs: 18EXPL: 0

The RPC Marshalling Engine (aka NDR) in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 SP2 does not properly maintain its internal state, which allows remote attackers to overwrite arbitrary memory locations via a crafted RPC message that triggers incorrect pointer reading, related to "IDL interfaces containing a non-conformant varying array" and FC_SMVARRAY, FC_LGVARRAY, FC_VARIABLE_REPEAT, and FC_VARIABLE_OFFSET, aka "RPC Marshalling Engine Vulnerability." El motor RPC Marshalling (también conocido como NDR) en Microsoft Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP2, Vista Gold, SP1, y SP2, y Server 2008 SP2 no mantiene de forma adecuada su estado interno, lo que permite a atacantes remotos sobrescribir posiciones de memoria de su elección a través de un mensaje RPC manipulado que provoca una lectura de puntero incorrecta, relativo a "Interfaces IDL que contienen una tabla variable no conforme" y FC_SMVARRAY, FC_LGVARRAY, FC_VARIABLE_REPEAT, y FC_VARIABLE_OFFSET, tambien conocido como "Vulnerabilidad dl motor RPC Marshalling" • http://blogs.technet.com/srd/archive/2009/06/09/ms09-026-how-a-developer-can-know-if-their-rpc-interface-is-affected.aspx http://osvdb.org/54936 http://www.securityfocus.com/bid/35219 http://www.securitytracker.com/id?1022357 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http://www.vupen.com/english/advisories/2009/1545 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-026 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mit • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 87%CPEs: 1EXPL: 0

The LDAP service in Active Directory on Microsoft Windows 2000 SP4 does not properly free memory for LDAP and LDAPS requests, which allows remote attackers to execute arbitrary code via a request that uses hexadecimal encoding, whose associated memory is not released, related to a "DN AttributeValue," aka "Active Directory Invalid Free Vulnerability." NOTE: this issue is probably a memory leak. El servicio LDAP en Active Directory en Microsoft Windows 2000 SP4 no habilita correctamente la memoria para las solicitudes LDAP y LDAPS, lo que permite a los atacantes remotos ejecutar código arbitrario a través de una solicitud que utiliza codificación hexadecimal, cuya memoria asociada no es liberada, relacionado con un "DN AttributeValue," o "vulnerabilidad libre inválida de Active Directory." Nota: este problema es probablemente una fuga de memoria. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=804 http://osvdb.org/54937 http://secunia.com/advisories/35355 http://support.avaya.com/elmodocs2/security/ASA-2009-214.htm http://www.securityfocus.com/bid/35226 http://www.securitytracker.com/id?1022349 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http://www.vupen.com/english/advisories/2009/1537 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-018 https://oval.cisecurity&# • CWE-399: Resource Management Errors •