
CVE-2004-1361
https://notcve.org/view.php?id=CVE-2004-1361
23 Dec 2004 — Integer underflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a malformed .hlp file, which leads to a heap-based buffer overflow. • http://marc.info/?l=bugtraq&m=110383690219440&w=2 •

CVE-2004-0568
https://notcve.org/view.php?id=CVE-2004-0568
15 Dec 2004 — HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. La aplicación Hyperterminal de Windows NT 4.0, 2000, XP y Server 2003 no valida adecuadamente la longitud de un valor guardado en un fichero d... • http://marc.info/?l=bugtraq&m=110312618614849&w=2 •

CVE-2004-0571
https://notcve.org/view.php?id=CVE-2004-0571
15 Dec 2004 — Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901. El Convertidor de Microsoft Word para Windows 6.0 no valida adecuadamente ciertas longitudes de datos, lo que permite a atacantes remotos ejecutar código arbitrario mediante ficheros .wri, .rtf y .doc enviado por ... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041 •

CVE-2004-0893
https://notcve.org/view.php?id=CVE-2004-0893
15 Dec 2004 — The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." La interfaz de Llamada a Procedimiento Local (LPC) en el kernel de Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 no valida adecuadamente la longitud de mensajes enviádos al puerto LCP, lo que permite a usuar... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 •

CVE-2004-0899
https://notcve.org/view.php?id=CVE-2004-0899
15 Dec 2004 — The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote attackers to cause a denial of service (application crash) via a malformed DHCP message, aka "Logging Vulnerability." El servidor DHCP de Microsoft Windows NT 4.0 Server y Terminal Server Edition, cuando está activado el registro de actividad de DHCP, no valida adecuadamente la longitud de ciertos mensajes, lo que p... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042 •

CVE-2004-0900
https://notcve.org/view.php?id=CVE-2004-0900
15 Dec 2004 — The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote attackers to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability." El servidor DHCP de Microsoft Windows NT 4.0 Server y Terminal Server Edition no valida adecuadamente la longitud de ciertos mensajes, lo que permite a atacantes remotos ejecutar código de su elección mediante mensajes DHCP malformados, tamb... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042 •

CVE-2004-0901
https://notcve.org/view.php?id=CVE-2004-0901
15 Dec 2004 — Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571. El Convertidor de Microsoft Word para Windows 6.0 no valida adecuadamente ciertas longitudes de datos, lo que permite a atacantes remotos ejecutar código de su elección mediante ... • http://www.ciac.org/ciac/bulletins/p-055.shtml •

CVE-2004-1080 – Microsoft Windows - 'WINS' Remote Buffer Overflow (MS04-045)
https://notcve.org/view.php?id=CVE-2004-1080
01 Dec 2004 — The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." El servicio WINS (wins.exe) de Microsoft Windows NT Server 4.0, Windows 2000 Server y Windows Server 2003 permite a atacantes remotos escribir localizaciones de memoria arbitrarias y p... • https://www.exploit-db.com/exploits/909 •

CVE-2004-0978
https://notcve.org/view.php?id=CVE-2004-0978
21 Oct 2004 — Heap-based buffer overflow in the Hrtbeat.ocx (Heartbeat) ActiveX control for Internet Explorer 5.01 through 6, when users who visit online gaming sites that are associated with MSN, allows remote attackers to execute arbitrary code via the SetupData parameter. • http://marc.info/?l=bugtraq&m=110616221411579&w=2 • CWE-787: Out-of-bounds Write •

CVE-2004-0569
https://notcve.org/view.php?id=CVE-2004-0569
16 Oct 2004 — The RPC Runtime Library for Microsoft Windows NT 4.0 allows remote attackers to read active memory or cause a denial of service (system crash) via a malicious message, possibly related to improper length values. La librería de tiempo de ejecución RPC de Microsoft Windows NT 4.0 permite a atacantes remotos leer la memoria activa o causar una denegación de servicio (caída del sistema) mediante un mensaje malicioso, posiblemente relacionado con valores de longitud inapropiados. • http://marc.info/?l=bugtraq&m=109769394209518&w=2 •