Page 55 of 431 results (0.012 seconds)

CVSS: 10.0EPSS: 91%CPEs: 17EXPL: 0

Integer overflow in the Embedded OpenType (EOT) Font Engine in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 allows remote attackers to execute arbitrary code via a crafted table in an embedded font, aka "Embedded OpenType Font Integer Overflow Vulnerability." Desbordamiento de entero en el Embedded OpenType (EOT) Font Engine en Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP1 y SP2, Windows Server 2008 Gold, SP2, y R2, y Windows 7 permite a los atacantes remotos ejecutar códio a su elección a través de una tabla manipulada en una fuente embebida, también conocido como "Embedded OpenType Font Integer Overflow Vulnerability". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the conversion of an Embedded OpenType file to TrueType format within t2embed.dll. The most likely vector for this to be exploited is via Internet Explorer as an embedded font in an HTML/CSS document. • http://www.us-cert.gov/cas/techalerts/TA10-285A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-076 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6881 • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 91%CPEs: 26EXPL: 0

Use-after-free vulnerability in the CAttrArray::PrivateFind function in mshtml.dll in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code by setting an unspecified property of a stylesheet object, aka "Uninitialized Memory Corruption Vulnerability." Vulnerabilidad de Uso de la Memoria Previamente Liberada en la función CAttrArray::PrivateFind en la biblioteca mshtml.dll en Microsoft Internet Explorer versión 6 hasta la versión 8 permite a los atacantes remotos ejecutar código arbitrario mediante el establecimiento de una propiedad no especificada de un objeto StyleSheet, también se conoce como "Uninitialized Memory Corruption Vulnerability". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the function CAttrArray::PrivateFind as defined in mshtml.dll. If a specific property of a stylesheet object is set, the code within mshtml can be forced to free an object which is subsequently accessed later. • http://support.avaya.com/css/P8/documents/100113324 http://www.securityfocus.com/bid/43705 http://www.us-cert.gov/cas/techalerts/TA10-285A.html http://www.zerodayinitiative.com/advisories/ZDI-10-197 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7059 • CWE-416: Use After Free •

CVSS: 9.3EPSS: 97%CPEs: 17EXPL: 1

The Print Spooler service in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, when printer sharing is enabled, does not properly validate spooler access permissions, which allows remote attackers to create files in a system directory, and consequently execute arbitrary code, by sending a crafted print request over RPC, as exploited in the wild in September 2010, aka "Print Spooler Service Impersonation Vulnerability." El servicio de cola de impresión en Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP1 y SP2, Windows Server 2008 Gold, SP2, y R2, y Windows 7, cuando está habilitada la compartición de impresoras, no valida adecuadamente los permisos de acceso a la cola, lo cual permite a los atacantes remotos crear ficheros en una carpeta del sistemas, y a consecuencia de ello ejecutar código a su elección, enviando una petición de impresión manipulada sobre RPC, se explota activamente desde Septiembre de 2010, también conocido como "Print Spooler Service Impersonation Vulnerability". • https://www.exploit-db.com/exploits/16361 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-061 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7358 • CWE-20: Improper Input Validation •

CVSS: 9.0EPSS: 24%CPEs: 10EXPL: 0

Heap-based buffer overflow in the Local Security Authority Subsystem Service (LSASS), as used in Active Directory in Microsoft Windows Server 2003 SP2 and Windows Server 2008 Gold, SP2, and R2; Active Directory Application Mode (ADAM) in Windows XP SP2 and SP3 and Windows Server 2003 SP2; and Active Directory Lightweight Directory Service (AD LDS) in Windows Vista SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7, allows remote authenticated users to execute arbitrary code via malformed LDAP messages, aka "LSASS Heap Overflow Vulnerability." Desbordamiento de búfer basado en memoria dinámica en el servicio Local Security Authority Subsystem (LSASS), como el usado en Active Directory de Microsoft Windows Server 2003 SP2 y Windows Server 2008 Gold, SP2, y R2; Active Directory Application Mode (ADAM) de Windows XP SP2 y SP3 y Windows Server 2003 SP2; y Active Directory Lightweight Directory Service (AD LDS) de Windows Vista SP2, Windows Server 2008 Gold, SP2, y R2, y Windows 7, permite a los usuarios remotos autenticados ejecutar código a su elección a través de mensajes LDAP malformados, también conocido como "LSASS Heap Overflow Vulnerability". • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-068 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7120 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.8EPSS: 0%CPEs: 13EXPL: 0

Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP1 and SP2, Windows Server 2008 SP2 and R2, and Windows 7 allow local users to gain privileges by leveraging access to a process with NetworkService credentials, as demonstrated by TAPI Server, SQL Server, and IIS processes, and related to the Windows Service Isolation feature. NOTE: the vendor states that privilege escalation from NetworkService to LocalSystem does not cross a "security boundary." Microsoft Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista SP1 y SP2, Windows Server 2008 SP2 y R2, y Windows 7 permiten a usuarios locales escalar privilegios accediendo a procesos con credenciales NetworkService, como sucede con los procesos servidor TAPI, SQL Server, e IIS. Relacionado con la funcionalidad "Windows Service Isolation". NOTA: el vendedor afirma que el escalado de privilegios de NetworkService a LocalSystem no traspasa un "security boundary" (frontera de seguridad). • http://support.microsoft.com/kb/2264072 http://support.microsoft.com/kb/982316 http://www.microsoft.com/technet/security/advisory/2264072.mspx • CWE-264: Permissions, Privileges, and Access Controls •