Page 5 of 102 results (0.004 seconds)

CVSS: 8.1EPSS: 34%CPEs: 27EXPL: 2

15 Dec 2004 — The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180. • http://archives.neohapsis.com/archives/bugtraq/2004-12/0167.html •

CVSS: 8.4EPSS: 80%CPEs: 5EXPL: 2

16 Oct 2004 — Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow. Los servicios Network Dynamic Data Exchange (NetDDE) de Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 permiten a atacantes ejecutar código de su el... • https://www.exploit-db.com/exploits/16371 •

CVSS: 7.8EPSS: 1%CPEs: 5EXPL: 0

16 Oct 2004 — "Shatter" style vulnerability in the Window Management application programming interface (API) for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to gain privileges by using certain API functions to change properties of privileged programs using the SetWindowLong and SetWIndowLongPtr API functions. Vulnerabilidad de estilo "hacer añicos" en la interfaz de programación de aplicación (API) de Administración de Windows en Microsoft Windows 98, Windows... • http://marc.info/?l=bugtraq&m=109777417922695&w=2 •

CVSS: 10.0EPSS: 74%CPEs: 5EXPL: 1

16 Oct 2004 — Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba. Desbordamiento de búfer en Microsoft Internet Explorer y Explorador de Windows XP SP1, 2000, 98 y Me puede permitir a usuarios remotos maliciosos causar una denegación de servicio (caída de aplicación) y posiblemente ejec... • https://www.exploit-db.com/exploits/24051 •

CVSS: 5.0EPSS: 38%CPEs: 46EXPL: 1

18 Aug 2004 — Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html". • http://marc.info/?l=bugtraq&m=109303291513335&w=2 •

CVSS: 10.0EPSS: 53%CPEs: 18EXPL: 0

21 Jul 2004 — Double free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image. mshtml.dll de ciertas versiones de Internet Explorer 6.x permite a atacantes remotos causar una denegación de servicio (caída de aplicación) y posiblemente ejecutar código arbitrario mediante una imagen GIF malformada que dispara un desbordamiento de búfer. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-September/009445.html • CWE-415: Double Free •

CVSS: 10.0EPSS: 38%CPEs: 54EXPL: 0

14 Jul 2004 — Heap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041. Vulnerabilidad basada en el montón en el programa HtmlHelp (hh.exe) en ayuda HTML de Microsoft Windows 98, Me, NT, 4.0, 2000, XP y Server 2003 permite a atacantes remotos ejecutar órdenes de su elección mediante un fichero .CHML con... • http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023919.html •

CVSS: 7.5EPSS: 29%CPEs: 28EXPL: 0

11 Jun 2004 — IDirectPlay4 Application Programming Interface (API) of Microsoft DirectPlay 7.0a thru 9.0b, as used in Windows Server 2003 and earlier allows remote attackers to cause a denial of service (application crash) via a malformed packet. El interfaz de programación de aplicación (API) IDirectPlay de Microsoft DirectPlay 7.0a a 9.0b, usado en Windows Server 2003 y anteriores, permite a atacantes remotos causar una denegación de servicio (caída de aplicación) mediante un paquete malformado. • http://secunia.com/advisories/11802 •

CVSS: 8.4EPSS: 88%CPEs: 8EXPL: 3

16 Apr 2004 — Stack-based buffer overflow in certain Active Directory service functions in LSASRV.DLL of the Local Security Authority Subsystem Service (LSASS) in Microsoft Windows NT 4.0 SP6a, 2000 SP2 through SP4, XP SP1, Server 2003, NetMeeting, Windows 98, and Windows ME, allows remote attackers to execute arbitrary code via a packet that causes the DsRolerUpgradeDownlevelServer function to create long debug entries for the DCPROMO.LOG log file, as exploited by the Sasser worm. Desbordamiento de búfer basado en la pi... • https://www.exploit-db.com/exploits/16368 •

CVSS: 9.8EPSS: 41%CPEs: 6EXPL: 0

16 Apr 2004 — Unknown vulnerability in the H.323 protocol implementation in Windows 98, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code. Vulnerabilidad desconocida en la implementación del protocolo H.323 en Microsoft Windows 98, Windows 2000, Windows XP, y Windows Server 2003 permite a atacantes remotos ejecutar código arbitrario. • http://www.ciac.org/ciac/bulletins/o-114.shtml •