Page 6 of 637 results (0.010 seconds)

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

The kernel in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, and Vista Gold does not properly allocate memory for the destination key associated with a symbolic-link registry key, which allows local users to gain privileges via a crafted application, aka "Windows Kernel Memory Allocation Vulnerability." El kernel en Microsoft Windows 2000 SP4, XP SP2 y SP3, Server 2003 SP2, y Vista Gold no asigna adecuadamente memoria para llave destino asociada con una llave de registro de enlace simbólico, lo que permite a usuarios locales obtener privilegios a través de una aplicación manipulada, conocido como "Windows Kernel Memory Allocation Vulnerability." • http://secunia.com/advisories/39373 http://www.securitytracker.com/id?1023850 http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7113 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 29%CPEs: 23EXPL: 0

The WinVerifyTrust function in Authenticode Signature Verification 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows user-assisted remote attackers to execute arbitrary code via a modified (1) Portable Executable (PE) or (2) cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "WinVerifyTrust Signature Validation Vulnerability." La función WinVerifyTrust en Authenticode Signature Verification v5.1, v6.0, y v6.1 en Microsoft Windows 2000 SP4, Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, y SP2, Windows Server 2008 Gold, SP2, y R2, y Windows 7 no usa adecuadamente campos no especificados en el fichero digest, lo que permite a atacantes remotos asistidos por usuario ejecutar código de su elección a través de (1) Portable Executable (PE)modificado o (2) un fichero cabinet (como .CAB) que que aparece incorrectamente teniendo una firma válida, conocido como "WinVerifyTrust Signature Validation Vulnerability." • http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-019 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6787 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 29%CPEs: 23EXPL: 0

The Authenticode Signature verification functionality in cabview.dll in Cabinet File Viewer Shell Extension 5.1, 6.0, and 6.1 in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly use unspecified fields in a file digest, which allows remote attackers to execute arbitrary code via a modified cabinet (aka .CAB) file that incorrectly appears to have a valid signature, aka "Cabview Corruption Validation Vulnerability." La funcionalidad de verificación Authenticode Signature en cabview.dll en Cabinet File Viewer Shell Extension v5.1, v6.0, y v6.1 en Microsoft Windows 2000 SP4, Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, y SP2, Windows Server 2008 Gold, SP2, y R2, y Windows 7 no usa adecuadamente los campos en un fichero digest, lo que permite a atacantes remotos ejecutar código de su elección a través de un cabinet modificado (como .CAB) que aparenta incorrectamente tener una firma valida, conocida como "Cabview Corruption Validation Vulnerability." • http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-019 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6886 • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 2%CPEs: 23EXPL: 1

The SMB client in Microsoft Windows 2000 SP4, Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, and SP2, Windows Server 2008 Gold, SP2, and R2, and Windows 7 does not properly allocate memory for SMB responses, which allows remote SMB servers and man-in-the-middle attackers to execute arbitrary code via a crafted (1) SMBv1 or (2) SMBv2 response, aka "SMB Client Memory Allocation Vulnerability." El cliente SMB en Microsoft Windows 2000 SP4, Windows XP SP2 y SP3, Windows Server 2003 SP2, Windows Vista Gold, SP1, y SP2, Windows Server 2008 Gold, SP2, y R2, y Windows 7 no asigna adecuadamente memoria para respuestas SMB, lo que permite a servidores SMB remotos y atacantes por la técnica man-in-the-middle ejecutar código de su elección a través de una respuesta manipulada (1) SMBv1 o (2) SMBv2, conocido como "SMB Client Memory Allocation Vulnerability." • https://www.exploit-db.com/exploits/12273 http://secunia.com/advisories/39372 http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7129 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 96%CPEs: 1EXPL: 1

Stack-based buffer overflow in nsum.exe in the Windows Media Unicast Service in Media Services for Microsoft Windows 2000 Server SP4 allows remote attackers to execute arbitrary code via crafted packets associated with transport information, aka "Media Services Stack-based Buffer Overflow Vulnerability." Desbordamiento de búfer basado en nsum.exe en el Servicio Windows Media Unicast en Media Services para Microsoft Windows 2000 Server SP4 permite a atacantes remotos ejecutar código de su elección a través de paquetes manipulados asociados con información de transporte, conocido como "Media Services Stack-based Buffer Overflow Vulnerability." • https://www.exploit-db.com/exploits/16333 http://www.us-cert.gov/cas/techalerts/TA10-103A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-025 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7001 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •