Page 28 of 431 results (0.032 seconds)

CVSS: 9.3EPSS: 88%CPEs: 19EXPL: 0

The Authenticode Signature Verification function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, Windows 7 Gold and SP1, and Windows 8 Consumer Preview does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute arbitrary code via a modified file with additional content, aka "WinVerifyTrust Signature Validation Vulnerability." La función Authenticode Signature Verification en Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, y R2 SP1, Windows 7 Gold y SP1, y Windows 8 Consumer Preview no valida de forma adecuada el resumen de un fichero portable y ejecutable (PE), lo que permite a atacantes remotos asistidos por usuarios ejecutar código a través de un fichero modificado con contenido adicional, también conocido como "WinVerifyTrust Signature Validation Vulnerability". The Authenticode Signature Verification function in Microsoft Windows (WinVerifyTrust) does not properly validate the digest of a signed portable executable (PE) file, which allows user-assisted remote attackers to execute code. • http://osvdb.org/81135 http://secunia.com/advisories/48581 http://www.securitytracker.com/id?1026906 http://www.us-cert.gov/cas/techalerts/TA12-101A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-024 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15594 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 13EXPL: 0

win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly handle window messaging, which allows local users to gain privileges via a crafted application that calls the PostMessage function, aka "PostMessage Function Vulnerability." win32k.sys en los controladores en modo kernel de Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 Service Pack 2, R2 y R2 SP1, y Windows 7 Gold y SP1 no trata correctamente los mensajes de ventana, que permite a usuarios locales conseguir privilegios a través de una aplicación modificada que llama a la función PostMessage, también conocido como "Vulnerabilidad de la función PostMessage." • http://osvdb.org/80002 http://www.us-cert.gov/cas/techalerts/TA12-073A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14217 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 67%CPEs: 13EXPL: 2

The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2, R2, and R2 SP1, and Windows 7 Gold and SP1 does not properly process packets in memory, which allows remote attackers to execute arbitrary code by sending crafted RDP packets triggering access to an object that (1) was not properly initialized or (2) is deleted, aka "Remote Desktop Protocol Vulnerability." La aplicación Remote Desktop Protocol (RDP) de Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 Service Pack 2, R2 y R2 SP1, y Windows 7 Gold y SP1 no procesa correctamente los paquetes en la memoria, lo que permite a atacantes remotos ejecutar código arbitrario mediante el envío de paquetes RDP modificados que provocan acceso a un objeto que (1) no se ha inicializado correctamente o (2) se suprime, también conocido como "Remote Desktop Protocol Vulnerability." This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft's Remote Desktop Protocol. Authentication is not required to exploit this vulnerability. The specific flaw exists during handling of an error while loading elements into an array. This condition can cause the driver to abort a connection and part of the logic of the abort is to free an object associated with it. • https://www.exploit-db.com/exploits/18606 https://github.com/zhangkaibin0921/MS12-020-CVE-2012-0002 http://blogs.quickheal.com/remote-desktop-protocol-vulnerability-cve-2012-0002-not-dead-yet http://www.securitytracker.com/id?1026790 http://www.us-cert.gov/cas/techalerts/TA12-073A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14623 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.0EPSS: 95%CPEs: 4EXPL: 0

The DNS server in Microsoft Windows Server 2003 SP2 and Server 2008 SP2, R2, and R2 SP1 does not properly handle objects in memory during record lookup, which allows remote attackers to cause a denial of service (daemon restart) via a crafted query, aka "DNS Denial of Service Vulnerability." El servidor DNS en Microsoft Windows Server 2003 SP2 y Server 2008 Service Pack 2, R2 y R2 SP1, no trata correctamente los objetos en la memoria durante la búsqueda de registro, lo que permite a atacantes remotos provocar una denegación de servicio (reinicio del demonio) a través de una consulta modificada, también conocido como "DNS Denial of Service Vulnerability." • http://osvdb.org/80005 http://secunia.com/advisories/48394 http://www.securityfocus.com/bid/52374 http://www.securitytracker.com/id?1026789 http://www.us-cert.gov/cas/techalerts/TA12-073A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-017 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15098 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 28%CPEs: 26EXPL: 0

Microsoft .NET Framework 2.0 SP2, 3.5.1, and 4, and Silverlight 4 before 4.1.10111, does not properly restrict access to memory associated with unmanaged objects, which allows remote attackers to execute arbitrary code via (1) a crafted XAML browser application (aka XBAP), (2) a crafted ASP.NET application, (3) a crafted .NET Framework application, or (4) a crafted Silverlight application, aka ".NET Framework Unmanaged Objects Vulnerability." Microsoft .NET Framework v2.0 SP2 y v3.5.1 y v4, y Silverlight v4 antes de v4.1.10111, no restringe el acceso a la memoria asociada con objetos desatendidos, permiten a atacantes remotos ejecutar código de su elección a través de (1) una aplicación modificada de navegador XAML (también conocido como XBAP), (2) una aplicación ASP.NET modificada, o (3) una aplicación .NET Framework manipulada, también conocido como ".NET Framework Unmanaged Objects Vulnerability." • http://www.us-cert.gov/cas/techalerts/TA12-045A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13972 • CWE-94: Improper Control of Generation of Code ('Code Injection') •