Page 5 of 86 results (0.005 seconds)

CVSS: 9.3EPSS: 90%CPEs: 14EXPL: 16

30 Mar 2007 — Stack-based buffer overflow in the animated cursor code in Microsoft Windows 2000 SP4 through Vista allows remote attackers to execute arbitrary code or cause a denial of service (persistent reboot) via a large length value in the second (or later) anih block of a RIFF .ANI, cur, or .ico file, which results in memory corruption when processing cursors, animated cursors, and icons, a variant of CVE-2005-0416, as originally demonstrated using Internet Explorer 6 and 7. NOTE: this might be a duplicate of CVE-2... • https://www.exploit-db.com/exploits/3684 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.5EPSS: 1%CPEs: 2EXPL: 0

20 Mar 2007 — \Device\NdisTapi (NDISTAPI.sys) in Microsoft Windows XP SP2 and 2003 SP1 uses weak permissions, which allows local users to write to the device and cause a denial of service, as demonstrated by using an IRQL to acquire a spinlock on paged memory via the NdisTapiDispatch function. \Device\NdisTapi (NDISTAPI.sys) en Microsoft Windows XP SP2 y 2003 SP1 utiliza permisos débiles, lo que permite a los usuarios locales escribir en el dispositivo y causar una denegación de servicio, como es demostrado por el uso de... • http://secunia.com/advisories/24598 •

CVSS: 10.0EPSS: 25%CPEs: 8EXPL: 0

20 Mar 2007 — Stack-based buffer overflow in the AfxOleSetEditMenu function in the MFC component in Microsoft Windows 2000 SP4, XP SP2, and Server 2003 Gold and SP1, and Visual Studio .NET 2002 Gold and SP1, and 2003 Gold and SP1 allows user-assisted remote attackers to have an unknown impact (probably crash) via an RTF file with a malformed OLE object, which results in writing two 0x00 characters past the end of szBuffer, aka the "MFC42u.dll Off-by-Two Overflow." NOTE: this issue is due to an incomplete patch (MS07-012)... • http://www.securityfocus.com/archive/1/463009/100/0/threaded •

CVSS: 10.0EPSS: 61%CPEs: 18EXPL: 0

13 Feb 2007 — Microsoft Internet Explorer 5.01, 6, and 7 uses certain COM objects from (1) Msb1fren.dll, (2) Htmlmm.ocx, and (3) Blnmgrps.dll as ActiveX controls, which allows remote attackers to execute arbitrary code via unspecified vectors, a different issue than CVE-2006-4697. Microsoft Internet Explorer 5.01, 6, y 7 utiliza ciertos objetos COM de (1) Msb1fren.dll, (2) Htmlmm.ocx, y (3) Blnmgrps.dll como controles ActiveX, lo cual permite a atacantes remotos ejecutar código de su elección mediante vectores no especif... • http://secunia.com/advisories/24156 •

CVSS: 10.0EPSS: 76%CPEs: 12EXPL: 1

13 Feb 2007 — The wininet.dll FTP client code in Microsoft Internet Explorer 5.01 and 6 might allow remote attackers to execute arbitrary code via an FTP server response of a specific length that causes a terminating null byte to be written outside of a buffer, which causes heap corruption. El código del cliente FTP wininet.dll en Microsoft Internet Explorer 5.01 y 6 podría permitir a atacantes remotos ejecutar código de su elección mediante una respuesta FTP del servidor de una longitud específica que provoca que el byt... • https://www.exploit-db.com/exploits/3444 •

CVSS: 9.3EPSS: 54%CPEs: 18EXPL: 0

13 Feb 2007 — Microsoft Internet Explorer 5.01, 6, and 7 uses certain COM objects from Imjpcksid.dll as ActiveX controls, which allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: this issue might be related to CVE-2006-4193. Microsoft Internet Explorer 5.01, 6, y 7 utiliza ciertos objetos COM de Imjpcksid.dll como controles ActiveX, lo cual permite a atacantes remotos ejecutar código de su elección mediante vectores no especificados. NOTA: este asunto podría estar relacionado con CVE-2006-41... • http://secunia.com/advisories/24156 •

CVSS: 7.8EPSS: 56%CPEs: 3EXPL: 0

13 Feb 2007 — The OLE Dialog component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1 allows user-assisted remote attackers to execute arbitrary code via an RTF file with a malformed OLE object that triggers memory corruption. El componente OLE Dialog en Microsoft Windows 2000 SP4, XP SP2, y 2003 SP1 permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante un fichero RTF con un objeto OLE que dispara una corrupción de memoria. • http://secunia.com/advisories/24147 •

CVSS: 7.8EPSS: 2%CPEs: 3EXPL: 0

13 Feb 2007 — The hardware detection functionality in the Windows Shell in Microsoft Windows XP SP2 and Professional, and Server 2003 SP1 allows local users to gain privileges via an unvalidated parameter to a function related to the "detection and registration of new hardware." La funcionalidad de detección de hardware en la consola de Windows (Windows Shell) en Microsoft Windows XP SP2 permite a usuarios locales obtener privilegios mediante un parámetro no validado a una función relacionada con "detección y registro de... • http://secunia.com/advisories/24126 •

CVSS: 9.8EPSS: 58%CPEs: 8EXPL: 0

13 Feb 2007 — The HTML Help ActiveX control (Hhctrl.ocx) in Microsoft Windows 2000 SP3, XP SP2 and Professional, 2003 SP1 allows remote attackers to execute arbitrary code via unspecified functions, related to uninitialized parameters. El control HTML Help ActiveX (Hhctrl.ocx) en Microsoft Windows 2000 SP3, XP SP2 y Professional, 2003 SP1 permite a atacantes remotos ejecutar código de su elección mediante funciones no especificadas, relacionado con parámetros no inicializados. • http://secunia.com/advisories/24136 •

CVSS: 9.3EPSS: 68%CPEs: 10EXPL: 0

13 Feb 2007 — The RichEdit component in Microsoft Windows 2000 SP4, XP SP2, and 2003 SP1; Office 2000 SP3, XP SP3, 2003 SP2, and Office 2004 for Mac; and Learning Essentials for Microsoft Office 1.0, 1.1, and 1.5 allows user-assisted remote attackers to execute arbitrary code via a malformed OLE object in an RTF file, which triggers memory corruption. El componente RichEdit en Microsoft Windows 2000 SP4, XP SP2, y 2003 SP1; Office 2000 SP3, XP SP3, 2003 SP2, y Office 2004 para Mac; y Learning Essentials para Microsoft Of... • http://secunia.com/advisories/24152 •