Page 4 of 32 results (0.009 seconds)

CVSS: 7.5EPSS: 93%CPEs: 29EXPL: 0

Buffer overflow in the Remote Access Connection Manager service (RASMAN) service in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via certain crafted "RPC related requests," that lead to registry corruption and stack corruption, aka the "RASMAN Registry Corruption Vulnerability." • http://secunia.com/advisories/20630 http://securityreason.com/securityalert/1096 http://securitytracker.com/id?1016285 http://www.kb.cert.org/vuls/id/814644 http://www.osvdb.org/26436 http://www.securityfocus.com/archive/1/436977/100/0/threaded http://www.securityfocus.com/bid/18358 http://www.us-cert.gov/cas/techalerts/TA06-164A.html http://www.vupen.com/english/advisories/2006/2323 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-025 https& •

CVSS: 7.5EPSS: 92%CPEs: 29EXPL: 4

Buffer overflow in the Routing and Remote Access service (RRAS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows remote unauthenticated or authenticated attackers to execute arbitrary code via certain crafted "RPC related requests," aka the "RRAS Memory Corruption Vulnerability." • https://www.exploit-db.com/exploits/16375 https://www.exploit-db.com/exploits/16364 https://www.exploit-db.com/exploits/1965 https://www.exploit-db.com/exploits/1940 http://secunia.com/advisories/20630 http://securitytracker.com/id?1016285 http://www.kb.cert.org/vuls/id/631516 http://www.osvdb.org/26437 http://www.securityfocus.com/bid/18325 http://www.us-cert.gov/cas/techalerts/TA06-164A.html http://www.vupen.com/english/advisories/2006/2323 https:/&#x •

CVSS: 9.3EPSS: 94%CPEs: 45EXPL: 3

Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute. • https://www.exploit-db.com/exploits/1520 https://www.exploit-db.com/exploits/1505 https://www.exploit-db.com/exploits/1504 http://secunia.com/advisories/18852 http://securitytracker.com/id?1015628 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=393 http://www.kb.cert.org/vuls/id/692060 http://www.securityfocus.com/bid/16644 http://www.us-cert.gov/cas/techalerts/TA06-045A.html http://www.vupen.com/english/advisories/2006/0575 https://docs.micr • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.6EPSS: 96%CPEs: 9EXPL: 2

Unspecified vulnerability in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1, related to "An unchecked buffer" and possibly buffer overflows, allows remote attackers to execute arbitrary code via a crafted Windows Metafile (WMF) format image, aka "Windows Metafile Vulnerability." • https://www.exploit-db.com/exploits/1343 https://www.exploit-db.com/exploits/1346 http://secunia.com/advisories/17223 http://secunia.com/advisories/17461 http://secunia.com/advisories/17498 http://securityreason.com/securityalert/161 http://securitytracker.com/id?1015168 http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf http://www.eeye.com/html/research/advisories/AD20051108a.html http://www.eeye.com/html/research/advisories/AD20051108b.html http://www.kb.cert.org&#x •

CVSS: 7.5EPSS: 39%CPEs: 9EXPL: 1

Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. • https://www.exploit-db.com/exploits/1346 http://secunia.com/advisories/17223 http://secunia.com/advisories/17461 http://secunia.com/advisories/17498 http://securitytracker.com/id?1015168 http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf http://www.eeye.com/html/research/advisories/AD20051108b.html http://www.kb.cert.org/vuls/id/300549 http://www.securityfocus.com/bid/15352 http://www.us-cert.gov/cas/techalerts/TA05-312A.html http://www.vupen.com/english& •