
CVE-2005-0047 – Microsoft Windows - COM Structured Storage Local (MS05-012)
https://notcve.org/view.php?id=CVE-2005-0047
08 Feb 2005 — Windows 2000, XP, and Server 2003 does not properly "validate the use of memory regions" for COM structured storage files, which allows attackers to execute arbitrary code, aka the "COM Structured Storage Vulnerability." • https://www.exploit-db.com/exploits/1019 •

CVE-2005-0050
https://notcve.org/view.php?id=CVE-2005-0050
08 Feb 2005 — The License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, aka the "License Logging Service Vulnerability." • http://www.kb.cert.org/vuls/id/130433 • CWE-20: Improper Input Validation •

CVE-2005-0053 – Microsoft Internet Explorer 5.x - Valid File Drag and Drop Embedded Code (MS04-038)
https://notcve.org/view.php?id=CVE-2005-0053
08 Feb 2005 — Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability." Internet Explorer 5.01, 5.5 y 6 permite a los atacantes remotos ejecutar código arbitrario mediante eventos de arrastrar y soltar, también conocidos como "Vulnerabilidad de arrastrar y soltar". • https://www.exploit-db.com/exploits/24693 •

CVE-2005-0057
https://notcve.org/view.php?id=CVE-2005-0057
08 Feb 2005 — The Hyperlink Object Library for Windows 98, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a crafted link that triggers an "unchecked buffer" in the library, possibly due to a buffer overflow. La biblioteca de objetos Hyperlink para Windows 98, 2000, XP y Server 2003 permite a los atacantes remotos ejecutar código arbitrario a través de un enlace diseñado que activa un "buffer no controlado" en la biblioteca, posiblemente debido a un desbordamiento del buffer. • http://secunia.com/advisories/14195 •

CVE-2004-1306 – Microsoft Windows XP/2000/2003 - 'winhlp32' Phrase Integer Overflow
https://notcve.org/view.php?id=CVE-2004-1306
31 Dec 2004 — Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file. El desbordamiento de búfer basado en memoria dinámica (heap) en winhlp32.exe en Windows NT, Windows 2000 a SP4, Windows XP a SP2 y Windows 2003 permite a los atacantes remotos ejecutar código arbitrario a través de un archivo.hlp diseñado. • https://www.exploit-db.com/exploits/25049 •

CVE-2004-1305 – Microsoft Windows Kernel - '.ANI' File Parsing Crash
https://notcve.org/view.php?id=CVE-2004-1305
23 Dec 2004 — The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang. • https://www.exploit-db.com/exploits/721 •

CVE-2004-1361
https://notcve.org/view.php?id=CVE-2004-1361
23 Dec 2004 — Integer underflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a malformed .hlp file, which leads to a heap-based buffer overflow. • http://marc.info/?l=bugtraq&m=110383690219440&w=2 •

CVE-2004-0568
https://notcve.org/view.php?id=CVE-2004-0568
15 Dec 2004 — HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. La aplicación Hyperterminal de Windows NT 4.0, 2000, XP y Server 2003 no valida adecuadamente la longitud de un valor guardado en un fichero d... • http://marc.info/?l=bugtraq&m=110312618614849&w=2 •

CVE-2004-0571
https://notcve.org/view.php?id=CVE-2004-0571
15 Dec 2004 — Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901. El Convertidor de Microsoft Word para Windows 6.0 no valida adecuadamente ciertas longitudes de datos, lo que permite a atacantes remotos ejecutar código arbitrario mediante ficheros .wri, .rtf y .doc enviado por ... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041 •

CVE-2004-0893
https://notcve.org/view.php?id=CVE-2004-0893
15 Dec 2004 — The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." La interfaz de Llamada a Procedimiento Local (LPC) en el kernel de Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 no valida adecuadamente la longitud de mensajes enviádos al puerto LCP, lo que permite a usuar... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 •