Page 4 of 31 results (0.012 seconds)

CVSS: 7.5EPSS: 40%CPEs: 9EXPL: 1

Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. • https://www.exploit-db.com/exploits/1346 http://secunia.com/advisories/17223 http://secunia.com/advisories/17461 http://secunia.com/advisories/17498 http://securitytracker.com/id?1015168 http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf http://www.eeye.com/html/research/advisories/AD20051108b.html http://www.kb.cert.org/vuls/id/300549 http://www.securityfocus.com/bid/15352 http://www.us-cert.gov/cas/techalerts/TA05-312A.html http://www.vupen.com/english& •

CVSS: 7.5EPSS: 75%CPEs: 9EXPL: 1

COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.kb.cert.org/vuls/id/950516 http://www.securityfocus.com/bid/15057 http://www.us-cert.gov/cas/techalerts/TA05-284A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 https://ov •

CVSS: 5.0EPSS: 20%CPEs: 9EXPL: 2

Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. • https://www.exploit-db.com/exploits/26341 https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securitytracker.com/id?1015037 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.idefense.com/application/poi/display?id=320&type=vulnerabilities http://www.securityfocus.com/bid/15058 https://docs.microsoft.com/en-us/secur •

CVSS: 5.0EPSS: 5%CPEs: 9EXPL: 1

Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." • https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securitytracker.com/id?1015037 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.idefense.com/application/poi/display?id=319&type=vulnerabilities http://www.securityfocus.com/bid/15059 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 https:& •

CVSS: 5.0EPSS: 93%CPEs: 9EXPL: 2

The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer. • https://www.exploit-db.com/exploits/1341 https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securityreason.com/securityalert/73 http://securitytracker.com/id?1015037 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.eeye.com/html/research/advisories/AD20051011b.html http://www.kb.cert.org/vuls/id/180868 http: •