Page 6 of 47 results (0.005 seconds)

CVSS: 7.6EPSS: 96%CPEs: 9EXPL: 2

Unspecified vulnerability in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1, related to "An unchecked buffer" and possibly buffer overflows, allows remote attackers to execute arbitrary code via a crafted Windows Metafile (WMF) format image, aka "Windows Metafile Vulnerability." • https://www.exploit-db.com/exploits/1343 https://www.exploit-db.com/exploits/1346 http://secunia.com/advisories/17223 http://secunia.com/advisories/17461 http://secunia.com/advisories/17498 http://securityreason.com/securityalert/161 http://securitytracker.com/id?1015168 http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf http://www.eeye.com/html/research/advisories/AD20051108a.html http://www.eeye.com/html/research/advisories/AD20051108b.html http://www.kb.cert.org&#x •

CVSS: 7.5EPSS: 40%CPEs: 9EXPL: 1

Multiple integer overflows in the Graphics Rendering Engine (GDI32.DLL) in Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allow remote attackers to execute arbitrary code via crafted Windows Metafile (WMF) and Enhanced Metafile (EMF) format images that lead to heap-based buffer overflows, as demonstrated using MRBP16::bCheckRecord. • https://www.exploit-db.com/exploits/1346 http://secunia.com/advisories/17223 http://secunia.com/advisories/17461 http://secunia.com/advisories/17498 http://securitytracker.com/id?1015168 http://support.avaya.com/elmodocs2/security/ASA-2005-228.pdf http://www.eeye.com/html/research/advisories/AD20051108b.html http://www.kb.cert.org/vuls/id/300549 http://www.securityfocus.com/bid/15352 http://www.us-cert.gov/cas/techalerts/TA05-312A.html http://www.vupen.com/english& •

CVSS: 7.5EPSS: 75%CPEs: 9EXPL: 1

COM+ in Microsoft Windows does not properly "create and use memory structures," which allows local users or remote attackers to execute arbitrary code. • https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.kb.cert.org/vuls/id/950516 http://www.securityfocus.com/bid/15057 http://www.us-cert.gov/cas/techalerts/TA05-284A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 https://ov •

CVSS: 5.0EPSS: 20%CPEs: 9EXPL: 2

Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. • https://www.exploit-db.com/exploits/26341 https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securitytracker.com/id?1015037 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.idefense.com/application/poi/display?id=320&type=vulnerabilities http://www.securityfocus.com/bid/15058 https://docs.microsoft.com/en-us/secur •

CVSS: 5.0EPSS: 5%CPEs: 9EXPL: 1

Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." • https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securitytracker.com/id?1015037 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.idefense.com/application/poi/display?id=319&type=vulnerabilities http://www.securityfocus.com/bid/15059 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 https:& •