CVE-2015-1763
https://notcve.org/view.php?id=CVE-2015-1763
Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014 does not prevent use of uninitialized memory in certain attempts to execute virtual functions, which allows remote authenticated users to execute arbitrary code via a crafted query, aka "SQL Server Remote Code Execution Vulnerability." Microsoft SQL Server 2008 SP3 y SP4, 2008 R2 SP2 y SP3, 2012 SP1 y SP2, y 2014 no previene el uso de memoria no inicializada en ciertos intentos de ejecución de funciones virtuales, lo que permite a usuarios autenticados remotamente ejecutar código arbitrario a través de una consulta manipulada, también conocida como “Vulnerabilidad de Ejecución Remota de código en SQL Server.” • http://www.securitytracker.com/id/1032893 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058 • CWE-284: Improper Access Control •
CVE-2015-1762
https://notcve.org/view.php?id=CVE-2015-1762
Microsoft SQL Server 2008 SP3 and SP4, 2008 R2 SP2 and SP3, 2012 SP1 and SP2, and 2014, when transactional replication is configured, does not prevent use of uninitialized memory in unspecified function calls, which allows remote authenticated users to execute arbitrary code by leveraging certain permissions and making a crafted query, as demonstrated by the VIEW SERVER STATE permission, aka "SQL Server Remote Code Execution Vulnerability." Microsoft SQL Server 2008 SP3 Y SP4, 2008 R2 SP2 Y SP3, 2012 SP1 Y SP2, and 2014, cuando es configurada una replicación transaccional, no impide el uso de la memoria sin inicializar en llamadas a funciones no especificadas que permite a los usuarios remotos autenticados ejecutar código arbitrario mediante el aprovechamiento de ciertos permisos y hacer una consulta de forma manual, como lo demuestra el permiso VIEW SERVER STATE, error conocido como 'SQL Server Remote Code Execution Vulnerability.' • http://www.securitytracker.com/id/1032893 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-058 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •
CVE-2014-4061
https://notcve.org/view.php?id=CVE-2014-4061
Microsoft SQL Server 2008 SP3, 2008 R2 SP2, and 2012 SP1 does not properly control use of stack memory for processing of T-SQL batch commands, which allows remote authenticated users to cause a denial of service (daemon hang) via a crafted T-SQL statement, aka "Microsoft SQL Server Stack Overrun Vulnerability." Microsoft SQL Server 2008 SP3, 2008 R2 SP2, y 2012 SP1 no controla debidamente el uso de la memoria en pila para el procesamiento de comandos de lotes T-SQL, lo que permite a usuarios remotos autenticados causar una denegación de servicio (cuelgue de demonio) a través de una declaración T-SQL manipulada, también conocido como 'vulnerabilidad de saturación de pila de Microsoft SQL Server.' • http://blogs.technet.com/b/srd/archive/2014/08/12/assessing-risk-for-the-august-2014-security-updates.aspx http://secunia.com/advisories/60676 http://www.securitytracker.com/id/1030716 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-044 • CWE-399: Resource Management Errors •
CVE-2012-2552
https://notcve.org/view.php?id=CVE-2012-2552
Cross-site scripting (XSS) vulnerability in the SQL Server Report Manager in Microsoft SQL Server 2000 Reporting Services SP2 and SQL Server 2005 SP4, 2008 SP2 and SP3, 2008 R2 SP1, and 2012 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka "Reflected XSS Vulnerability." Una vulnerabilidad de ejecución de comandos en sitios cruzados (XSS) en SQL Server Report Manager en Microsoft SQL Server 2000 Reporting Services SP2 y SQL Server 2005 SP4, 2008 SP2 y SP3, 2008 R2 SP1, y 2012, permite a atacantes remotos inyectar secuencias de comandos web o HTML a través a los parámetros especificados Es una vulnerabilidad también conocido como "Vulnerabilidad de XSS reflejado". • http://www.securityfocus.com/bid/55783 http://www.us-cert.gov/cas/techalerts/TA12-283A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2012/ms12-070 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A15395 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2012-4969 – Microsoft Internet Explorer Use-After-Free Vulnerability
https://notcve.org/view.php?id=CVE-2012-4969
Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012. Vulnerabilidad de error en la gestión de recursos en la función CMshtmlEd::Exec en mshtml.dll en Microsoft Internet Explorer 6 a 9 permite a atacantes remotos ejecutar código arbitrario a través de un sitio web diseñado, como se ha explotado en septiembre de 2012. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the CCommand::Exec function. It is possible to free certain objects in a callback function called from the CCommand::Exec function. • https://www.exploit-db.com/exploits/21840 http://blog.vulnhunt.com/index.php/2012/09/17/ie-execcommand-fuction-use-after-free-vulnerability-0day_en http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/browser/ie_execcommand_uaf.rb http://eromang.zataz.com/2012/09/16/zero-day-season-is-really-not-over-yet http://technet.microsoft.com/security/advisory/2757760 http://www.kb.cert.org/vuls/id/480095 http://www.securitytracker.com/id?1027538 http •