Page 72 of 431 results (0.013 seconds)

CVSS: 7.2EPSS: 0%CPEs: 34EXPL: 0

Buffer overflow in a certain USB driver, as used on Microsoft Windows, allows attackers to execute arbitrary code. Desbordamiento de búfer en cierto driver USB, usado en Windows, permite que atacantes ejecuten código arbitrario. • http://secunia.com/advisories/16210 http://securitytracker.com/id?1014566 http://www.eweek.com/article2/0%2C1759%2C1840131%2C00.asp http://www.osvdb.org/18493 http://www.securityfocus.com/bid/14376 https://exchange.xforce.ibmcloud.com/vulnerabilities/21539 •

CVSS: 5.0EPSS: 88%CPEs: 4EXPL: 0

The Telnet client for Microsoft Windows XP, Windows Server 2003, and Windows Services for UNIX allows remote attackers to read sensitive environment variables via the NEW-ENVIRON option with a SEND ENV_USERVAR command. • http://idefense.com/application/poi/display?id=260&type=vulnerabilities http://secunia.com/advisories/15690 http://securitytracker.com/id?1014203 http://www.kb.cert.org/vuls/id/800829 http://www.securityfocus.com/bid/13940 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-033 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1132 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A605 https:/ •

CVSS: 7.5EPSS: 55%CPEs: 5EXPL: 0

Buffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability." • http://secunia.com/advisories/15694 http://www.kb.cert.org/vuls/id/489397 http://www.us-cert.gov/cas/techalerts/TA05-165A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-027 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1142 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A259 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A467 •

CVSS: 5.1EPSS: 15%CPEs: 49EXPL: 0

Microsoft Agent allows remote attackers to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page. Microsoft Agent permite a los atacantes remotos falsificar contenido de Internet de confianza y ejecutar código arbitrario disfrazando las indicaciones de seguridad en una página web maliciosa. • http://secunia.com/advisories/15689 http://www.securityfocus.com/bid/13948 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-032 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1194 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A682 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A906 •

CVSS: 7.2EPSS: 1%CPEs: 2EXPL: 0

Buffer overflow in the Web Client service in Microsoft Windows XP and Windows Server 2003 allows remote authenticated users to execute arbitrary code via a crafted WebDAV request containing special parameters. • http://secunia.com/advisories/15696 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-028 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1255 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A721 •