Page 66 of 637 results (0.008 seconds)

CVSS: 5.5EPSS: 0%CPEs: 9EXPL: 3

The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows local users to cause a denial of service (hang) by calling the MrxSmbCscIoctlCloseForCopyChunk with the file handle of the shadow device, which results in a deadlock, aka the "SMB Invalid Handle Vulnerability." • https://www.exploit-db.com/exploits/28001 https://www.exploit-db.com/exploits/1911 http://secunia.com/advisories/20635 http://securitytracker.com/id?1016288 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=409 http://www.osvdb.org/26439 http://www.securityfocus.com/bid/18357 http://www.vupen.com/english/advisories/2006/2327 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-030 https://exchange.xforce.ibmcloud.com/vulnerabilities/26830 ht • CWE-667: Improper Locking •

CVSS: 10.0EPSS: 0%CPEs: 7EXPL: 2

The Server Message Block (SMB) driver (MRXSMB.SYS) in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 and earlier allows local users to execute arbitrary code by calling the MrxSmbCscIoctlOpenForCopyChunk function with the METHOD_NEITHER method flag and an arbitrary address, possibly for kernel memory, aka the "SMB Driver Elevation of Privilege Vulnerability." • https://www.exploit-db.com/exploits/1910 https://www.exploit-db.com/exploits/1911 http://secunia.com/advisories/20635 http://securitytracker.com/id?1016288 http://www.idefense.com/intelligence/vulnerabilities/display.php?id=408 http://www.osvdb.org/26440 http://www.securityfocus.com/bid/18356 http://www.vupen.com/english/advisories/2006/2327 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-030 https://exchange.xforce.ibmcloud.com/vulnerabilities/26828 htt • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 6.8EPSS: 94%CPEs: 32EXPL: 0

Microsoft JScript 5.1, 5.5, and 5.6 on Windows 2000 SP4, and 5.6 on Windows XP, Server 2003, Windows 98 and Windows Me, will "release objects early" in certain cases, which results in memory corruption and allows remote attackers to execute arbitrary code. • http://secunia.com/advisories/20620 http://securitytracker.com/id?1016283 http://www.kb.cert.org/vuls/id/390044 http://www.osvdb.org/26434 http://www.securityfocus.com/bid/18359 http://www.us-cert.gov/cas/techalerts/TA06-164A.html http://www.vupen.com/english/advisories/2006/2321 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-023 https://exchange.xforce.ibmcloud.com/vulnerabilities/26805 https://oval.cisecurity.org/repository/search/definition/ov •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 3

The RtlDosPathNameToNtPathName_U API function in NTDLL.DLL in Microsoft Windows 2000 SP4 and XP SP2 does not properly convert DOS style paths with trailing spaces into NT style paths, which allows context-dependent attackers to create files that cannot be accessed through the expected DOS path or prevent access to other similarly named files in the same directory, which prevents those files from being detected or disinfected by certain anti-virus and anti-spyware software. • https://www.exploit-db.com/exploits/27851 http://www.48bits.com/advisories/rtldospath.pdf http://www.osvdb.org/25761 http://www.securityfocus.com/archive/1/433583/100/0/threaded http://www.securityfocus.com/bid/17934 https://exchange.xforce.ibmcloud.com/vulnerabilities/26487 •

CVSS: 5.0EPSS: 16%CPEs: 62EXPL: 0

Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0, 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to cause a denial of service (crash) via a BuildContextW request with a large (1) UuidString or (2) GuidIn of a certain length, which causes an out-of-range memory access, aka the MSDTC Denial of Service Vulnerability. NOTE: this is a variant of CVE-2005-2119. • http://secunia.com/advisories/20000 http://securityreason.com/securityalert/864 http://securitytracker.com/id?1016047 http://www.eeye.com/html/research/advisories/AD20060509b.html http://www.osvdb.org/25336 http://www.securityfocus.com/archive/1/433425/100/0/threaded http://www.securityfocus.com/bid/17905 http://www.vupen.com/english/advisories/2006/1742 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-018 https://exchange.xforce.ibmcloud.com/vulnerabilities& •