Page 3 of 39 results (0.006 seconds)

CVSS: 9.3EPSS: 11%CPEs: 17EXPL: 6

Microsoft Windows 2000 Gold through SP4, XP Gold through SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, and Server 2008 allows remote SMB servers to execute arbitrary code on a client machine by replaying the NTLM credentials of a client user, as demonstrated by backrush, aka "SMB Credential Reflection Vulnerability." NOTE: some reliable sources report that this vulnerability exists because of an insufficient fix for CVE-2000-0834. Se presenta una vulnerabilidad en Microsoft Windows 2000 Gold hasta SP4, XP Gold hasta SP3, Server 2003 SP1 y SP2, Vista Gold y SP1, y Server 2008 permite a los servidores SMB remotos ejecutar código arbitrario en una maquina cliente mediante la reproducción de las credenciales NTLM de un usuario cliente, como se demuestra. por backrush, también se conoce como "SMB Credential Reflection Vulnerability." . NOTA: algunas fuentes confiables informan que esta vulnerabilidad existe debido a una corrección insuficiente para CVE-2000-0834. • https://www.exploit-db.com/exploits/16360 https://www.exploit-db.com/exploits/7125 https://www.exploit-db.com/exploits/20 http://marc.info/?l=bugtraq&m=122703006921213&w=2 http://osvdb.org/49736 http://secunia.com/advisories/32633 http://securitytracker.com/id?1021163 http://www.networkworld.com/news/2008/111208-microsoft-seven-year-security-patch.html http://www.securityfocus.com/bid/7385 http://www.securityfocus.com/data/vulnerabilities/exploits/backrush.patch http:// • CWE-287: Improper Authentication •

CVSS: 7.1EPSS: 2%CPEs: 2049EXPL: 0

The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. La implementación del protocolo TCP en (1) Linux, (2) plataformas basadas en BSD Unix, (3) Microsoft Windows, (4) productos Cisco, y probablemente otros sistemas operativos, permite a atacantes remotos provocar una denegación de servicio (agotamiento de cola de conexión) a través de múltiples vectores que manipulan información en la tabla de estados del TCP, como lo demuestra sockstress. • http://blog.robertlee.name/2008/10/conjecture-speculation.html http://insecure.org/stf/tcp-dos-attack-explained.html http://lists.immunitysec.com/pipermail/dailydave/2008-October/005360.html http://marc.info/?l=bugtraq&m=125856010926699&w=2 http://searchsecurity.techtarget.com.au/articles/27154-TCP-is-fundamentally-borked http://www.cisco.com/en/US/products/products_security_advisory09186a0080af511d.shtml http://www.cisco.com/en/US/products/products_security_response09186a0080a15120.html http://www.cpni • CWE-16: Configuration •

CVSS: 6.8EPSS: 1%CPEs: 31EXPL: 0

Heap-based buffer overflow in Apple QuickTime before 7.5.5 allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a QuickTime Virtual Reality (QTVR) movie file with crafted panorama atoms. Desbordamiento de búfer basado en montículo en Apple Quicktime anterior a 7.7.5 permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (caída de aplicación)a través de una película QuickTime Virtual Reality (QTVR)con átomos panorama manipulados. • http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html http://secunia.com/advisories/31821 http://securitytracker.com/id?1020841 http://support.apple.com/kb/HT3027 http://www.securityfocus.com/bid/31086 http://www.vupen.com/english/advisories/2008/2527 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16124 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 2%CPEs: 37EXPL: 0

Apple QuickTime before 7.5.5 allows remote attackers to cause a denial of service (application crash) via a crafted PICT image that triggers an out-of-bounds read. Apple QuickTime anterior a 7.5.5 , permite a atacantes remotos provocar una denegación de servicio (caída de la aplicación), a través de una imagen PICT manipulada que induce una lectura fuera de rango. • http://lists.apple.com/archives/security-announce//2008/Sep/msg00000.html http://lists.apple.com/archives/security-announce/2008/Oct/msg00000.html http://secunia.com/advisories/31821 http://secunia.com/advisories/32121 http://securitytracker.com/id?1020841 http://support.apple.com/kb/HT3027 http://support.apple.com/kb/HT3189 http://www.securityfocus.com/bid/31086 http://www.securityfocus.com/bid/31548 http://www.vupen.com/english/advisories/2008/2527 http://www.vupen • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 1%CPEs: 6EXPL: 1

mDNSResponder in the Bonjour Namespace Provider in Apple Bonjour for Windows before 1.0.5 allows attackers to cause a denial of service (NULL pointer dereference and application crash) by resolving a crafted .local domain name that contains a long label. mDNSResponder de Bonjour Namespace Provider en Apple Bonjour para Windows versiones anteriores a la 1.0.5, permite a atacantes provocar una denegación de servicio (puntero NULO sin referencia y caída de aplicación) resolviendo un nombre de dominio .local manipulado que contiene una etiqueta larga.ñ • https://www.exploit-db.com/exploits/32350 http://lists.apple.com/archives/security-announce//2008/Sep/msg00002.html http://secunia.com/advisories/31822 http://support.apple.com/kb/HT2990 http://www.securityfocus.com/bid/31091 http://www.securitytracker.com/id?1020845 http://www.vupen.com/english/advisories/2008/2524 https://exchange.xforce.ibmcloud.com/vulnerabilities/45005 • CWE-20: Improper Input Validation •