Page 6 of 73 results (0.001 seconds)

CVSS: 9.8EPSS: 81%CPEs: 48EXPL: 5

17 Oct 2003 — The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack. El servicio de mensajería de Windows NT a Server 2003 no verifica adecuadamente la longitud del mensaje, lo que permite a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/385 •

CVSS: 9.8EPSS: 51%CPEs: 10EXPL: 1

28 Jun 2003 — Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag. Desbordamiento de búfer en el Convertidor HTML (HTML32.cnv) de varios sistemas operativos Windows, permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario me... • https://www.exploit-db.com/exploits/22824 •

CVSS: 8.8EPSS: 18%CPEs: 46EXPL: 0

21 Mar 2003 — Integer overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack. Desbordamiento de enteros en JsArrayFunctionHeapSort usado en el Motor de script Windows de JScript (JScript.dll) en varios sistemas operativos Windows permite a atacantes remotos ejecutar có... • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0139.html •

CVSS: 6.8EPSS: 14%CPEs: 3EXPL: 1

07 Mar 2003 — Cross-site scripting (XSS) vulnerability in Help and Support Center for Microsoft Windows Me allows remote attackers to execute arbitrary script in the Local Computer security context via an hcp:// URL with the malicious script in the topic parameter. Vulnerabilidad de scripts en sitios cruzados (XSS) en el Centro de Ayuda y Soporte de Windows Me permite a hackers remotos ejecutar script arbitrario en el contexto de seguridad del 'Ordenador Local' mediante una URL hcp:// con el código malicioso en el paráme... • https://www.exploit-db.com/exploits/22289 •

CVSS: 10.0EPSS: 7%CPEs: 43EXPL: 0

23 Dec 2002 — Microsoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to execute arbitrary code by including a Java applet that invokes COM (Component Object Model) objects in a web site or an HTML mail. La Máquina Virtual de Microsoft (VM) hasta 5.0.3805 inclusive permite a atacantes remotos ejecutar código arbitrario incluyendo un applet de Java que invoca objetos COM (Component Object Model) en un sitio web o en un correo HTML. • http://www.securityfocus.com/bid/6371 •

CVSS: 9.1EPSS: 4%CPEs: 43EXPL: 0

23 Dec 2002 — The Java Database Connectivity (JDBC) APIs in Microsoft Virtual Machine (VM) 5.0.3805 and earlier allow remote attackers to bypass security checks and access database contents via an untrusted Java applet. Las APIs de conectividad de base de datos Java (JDBC) en Microsoft Virtual Machine (VM) 5.0.3805 y anteriores permiten a los atacantes remotos eludir las comprobaciones de seguridad y acceder al contenido de la base de datos a través de un applet Java no fiable. • http://www.ciac.org/ciac/bulletins/n-026.shtml •

CVSS: 5.0EPSS: 5%CPEs: 43EXPL: 0

23 Dec 2002 — Microsoft Virtual Machine (VM) build 5.0.3805 and earlier allows remote attackers to determine a local user's username via a Java applet that accesses the user.dir system property, aka "User.dir Exposure Vulnerability." Microsoft Virtual Machine (VM) build versión 5.0.3805 y anteriores permite a los atacantes remotos determinar el nombre de usuario de un usuario local a través de un applet de Java que accede a la propiedad del sistema user.dir, también conocida como "User.dir Exposure Vulnerability". • http://www.securityfocus.com/bid/6380 •

CVSS: 7.5EPSS: 1%CPEs: 43EXPL: 0

17 Dec 2002 — Two vulnerabilities in Microsoft Virtual Machine (VM) up to and including build 5.0.3805, as used in Internet Explorer and other applications, allow remote attackers to read files via a Java applet with a spoofed location in the CODEBASE parameter in the APPLET tag, possibly due to a parsing error. Dos vulnerabilidades en la Máquina Virtual de Microsoft (VM) hasta 5.0.3805 inclusive, como la usada en Internet Explorer y otras aplicaciones, permite a atacantes remotos leer ficheros mediante un applet Java co... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-069 •

CVSS: 7.1EPSS: 19%CPEs: 5EXPL: 0

11 Oct 2002 — The Compressed Folders feature in Microsoft Windows 98 with Plus! Pack, Windows Me, and Windows XP does not properly check the destination folder during the decompression of ZIP files, which allows attackers to place an executable file in a known location on a user's system, aka "Incorrect Target Path for Zipped File Decompression." La característica de Carpetas Comprimidas en Microsoft Windows 98 con el paquete Plus!, Windows Me, y Windows XP no comprueba adecuadamente la carpeta de destino durante la desc... • http://www.iss.net/security_center/static/10252.php •

CVSS: 7.8EPSS: 21%CPEs: 46EXPL: 0

10 Oct 2002 — The HTML Help facility in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP uses the Local Computer Security Zone when opening .chm files from the Temporary Internet Files folder, which allows remote attackers to execute arbitrary code via HTML mail that references or inserts a malicious .chm file containing shortcuts that can be executed, aka "Code Execution via Compiled HTML Help File." • http://www.iss.net/security_center/static/10254.php •