Page 7 of 79 results (0.016 seconds)

CVSS: 5.0EPSS: 20%CPEs: 9EXPL: 2

Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service exception and exit) via an "unexpected protocol command during the reconnection request," which is not properly handled by the Transaction Internet Protocol (TIP) functionality. • https://www.exploit-db.com/exploits/26341 https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securitytracker.com/id?1015037 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.idefense.com/application/poi/display?id=320&type=vulnerabilities http://www.securityfocus.com/bid/15058 https://docs.microsoft.com/en-us/secur •

CVSS: 5.0EPSS: 5%CPEs: 9EXPL: 1

Distributed Transaction Controller in Microsoft Windows allows remote servers to cause a denial of service (MSDTC service hang) via a crafted Transaction Internet Protocol (TIP) message that causes DTC to repeatedly connect to a target IP and port number after an error occurs, aka the "Distributed TIP Vulnerability." • https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securitytracker.com/id?1015037 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.idefense.com/application/poi/display?id=319&type=vulnerabilities http://www.securityfocus.com/bid/15059 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-051 https:& •

CVSS: 5.0EPSS: 93%CPEs: 9EXPL: 2

The MIDL_user_allocate function in the Microsoft Distributed Transaction Coordinator (MSDTC) proxy (MSDTCPRX.DLL) allocates a 4K page of memory regardless of the required size, which allows attackers to overwrite arbitrary memory locations using an incorrect size value that is provided to the NdrAllocate function, which writes management data to memory outside of the allocated buffer. • https://www.exploit-db.com/exploits/1341 https://www.exploit-db.com/exploits/1352 http://secunia.com/advisories/17161 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securityreason.com/securityalert/73 http://securitytracker.com/id?1015037 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.eeye.com/html/research/advisories/AD20051011b.html http://www.kb.cert.org/vuls/id/180868 http: •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

The user interface in the Windows Firewall does not properly display certain malformed entries in the Windows Registry, which makes it easier for attackers with administrator privileges to hide activities if the administrator only uses the Windows Firewall interface to monitor exceptions. NOTE: the vendor disputes this issue, saying that since administrative privileges are already required, it is not a vulnerability. CVE has not yet formally decided if such "information hiding" issues should be included. • http://www.microsoft.com/technet/security/advisory/897663.mspx •

CVSS: 5.0EPSS: 22%CPEs: 24EXPL: 1

The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests. • https://www.exploit-db.com/exploits/1143 http://marc.info/?l=bugtraq&m=112146383919436&w=2 http://security-protocols.com/modules.php?name=News&file=article&sid=2783 http://www.kb.cert.org/vuls/id/490628 http://www.microsoft.com/technet/security/advisory/904797.mspx http://www.securityfocus.com/bid/14259 http://www.us-cert.gov/cas/techalerts/TA05-221A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-041 https://oval.cisecurity.org/reposito •