Page 5 of 47 results (0.009 seconds)

CVSS: 9.8EPSS: 50%CPEs: 6EXPL: 1

31 Dec 2004 — The Windows Internet Naming Service (WINS) in Windows NT Server 4.0 SP 6a, NT Terminal Server 4.0 SP 6, Windows 2000 Server SP3 and SP4, and Windows Server 2003 does not properly validate the computer name value in a WINS packet, which allows remote attackers to execute arbitrary code or cause a denial of service (server crash), which results in an "unchecked buffer" and possibly triggers a buffer overflow, aka the "Name Validation Vulnerability." • https://www.exploit-db.com/exploits/733 •

CVSS: 7.8EPSS: 42%CPEs: 58EXPL: 3

31 Dec 2004 — Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file. El desbordamiento de búfer basado en memoria dinámica (heap) en winhlp32.exe en Windows NT, Windows 2000 a SP4, Windows XP a SP2 y Windows 2003 permite a los atacantes remotos ejecutar código arbitrario a través de un archivo.hlp diseñado. • https://www.exploit-db.com/exploits/25049 •

CVSS: 10.0EPSS: 22%CPEs: 74EXPL: 0

15 Dec 2004 — HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. La aplicación Hyperterminal de Windows NT 4.0, 2000, XP y Server 2003 no valida adecuadamente la longitud de un valor guardado en un fichero d... • http://marc.info/?l=bugtraq&m=110312618614849&w=2 •

CVSS: 7.8EPSS: 1%CPEs: 57EXPL: 0

15 Dec 2004 — The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." La interfaz de Llamada a Procedimiento Local (LPC) en el kernel de Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 no valida adecuadamente la longitud de mensajes enviádos al puerto LCP, lo que permite a usuar... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 •

CVSS: 7.8EPSS: 1%CPEs: 26EXPL: 1

15 Dec 2004 — LSASS (Local Security Authority Subsystem Service) of Windows 2000 Server and Windows Server 2003 does not properly validate connection information, which allows local users to gain privileges via a specially-designed program. El Servicio del Subsistema de la Autoridad de Seguridad Local (LSASS) de Windows 2000 Server and Windows Server 2003 no valida adecuadamente la información de conexión, lo que permite a usuarios locales ganar privilegios mediante un programa especialmente diseñado. • https://www.exploit-db.com/exploits/749 •

CVSS: 10.0EPSS: 72%CPEs: 4EXPL: 2

16 Oct 2004 — Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation. Desbordamiento de enteros en DUNZIP32.DLL de Microsoft Windows XP, Windows XP edición de 64 bits, Windows Server 2003, y Windows Server 2003 edición de 64 bits permite a atacantes remotos ejecutar código de su elecció... • https://www.exploit-db.com/exploits/677 •

CVSS: 9.8EPSS: 51%CPEs: 10EXPL: 1

28 Jun 2003 — Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag. Desbordamiento de búfer en el Convertidor HTML (HTML32.cnv) de varios sistemas operativos Windows, permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario me... • https://www.exploit-db.com/exploits/22824 •