Page 74 of 431 results (0.025 seconds)

CVSS: 5.0EPSS: 63%CPEs: 55EXPL: 1

The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated. • https://www.exploit-db.com/exploits/25439 http://seclists.org/lists/fulldisclosure/2005/Apr/0358.html http://seclists.org/lists/fulldisclosure/2005/Apr/0383.html http://seclists.org/lists/fulldisclosure/2005/Apr/0385.html http://www.securityfocus.com/bid/13215 https://exchange.xforce.ibmcloud.com/vulnerabilities/40502 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability". • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1271 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2043 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4397 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4832 •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 1

Stack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application that provides console window information with a long FaceName value. • https://www.exploit-db.com/exploits/1198 http://www.idefense.com/application/poi/display?id=230&type=vulnerabilities https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1822 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A266 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3544 https://oval.cisecurity.org/repository&#x •

CVSS: 7.5EPSS: 92%CPEs: 21EXPL: 1

The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document. • https://www.exploit-db.com/exploits/938 http://marc.info/?l=bugtraq&m=111755356016155&w=2 http://www.idefense.com/application/poi/display?id=231&type=vulnerabilities http://www.securiteam.com/exploits/5YP0T0AFFW.html http://www.securityfocus.com/bid/13132 http://www.vupen.com/english/advisories/2005/0335 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2184 https:// •

CVSS: 7.2EPSS: 0%CPEs: 23EXPL: 0

The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests. El kernel de Microsoft Windows 2000, Windows XP SP1 y SP2, y Windows Server 2003 permite a los usuarios locales obtener privilegios a través de determinadas solicitudes de acceso. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1656 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1761 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3994 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4593 •