Page 75 of 637 results (0.012 seconds)

CVSS: 7.5EPSS: 4%CPEs: 6EXPL: 1

Buffer overflow in the Telephony Application Programming Interface (TAPI) for Microsoft Windows 98, Windows 98 SE, Windows ME, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to elevate privileges or execute arbitrary code via a crafted message. • https://www.exploit-db.com/exploits/1584 http://secunia.com/advisories/16354 http://securitytracker.com/id?1014639 http://www.securityfocus.com/bid/14518 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-040 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100084 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100085 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef •

CVSS: 10.0EPSS: 97%CPEs: 2EXPL: 4

Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote attackers to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by the Zotob (aka Mytob) worm. Desbordamiento de búfer basado en pila en el servicio Plug and Play (PnP) de Microsoft Windows 2000 y Windows XP Service Pack 1 ; permite a atacantes remotos ejecutar código de su elección a través de un paquete manipulado. También los usuarios locales pueden aumentar sus privilegios a través de aplicaciones maliciosas, como se ha explotado con el gusano Zotob (también llamado Mytob). • https://www.exploit-db.com/exploits/16365 https://www.exploit-db.com/exploits/1146 https://www.exploit-db.com/exploits/1149 https://www.exploit-db.com/exploits/1179 http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0384.html http://secunia.com/advisories/16372 http://securitytracker.com/id?1014640 http://www.ciac.org/ciac/bulletins/p-266.shtml http://www.frsirt.com/english/alerts/20050814.ZotobA.php http://www.hsc.fr/ressources/presentations/null_sessions http: •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

Unknown vulnerability in Microsoft Windows 2000 Server and Windows Server 2003 domain controllers allows remote authenticated users to cause a denial of service (system crash) via a crafted Kerberos message. • http://secunia.com/advisories/16368 http://securitytracker.com/id?1014642 http://www.kb.cert.org/vuls/id/610133 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-042 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100095 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100097 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100099 https://oval.cisecurity.org/ •

CVSS: 3.6EPSS: 0%CPEs: 6EXPL: 0

Unknown vulnerability in the PKINIT Protocol for Microsoft Windows 2000, Windows XP, and Windows Server 2003 could allow a local user to obtain information and spoof a server via a man-in-the-middle (MITM) attack between a client and a domain controller when PKINIT smart card authentication is being used. • http://secunia.com/advisories/16368 http://securitytracker.com/id?1014642 http://www.kb.cert.org/vuls/id/477341 http://www.securityfocus.com/bid/14520 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-042 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100096 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100098 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Ad •

CVSS: 5.0EPSS: 22%CPEs: 24EXPL: 1

The Microsoft Windows kernel in Microsoft Windows 2000 Server, Windows XP, and Windows Server 2003 allows remote attackers to cause a denial of service (crash) via crafted Remote Desktop Protocol (RDP) requests. • https://www.exploit-db.com/exploits/1143 http://marc.info/?l=bugtraq&m=112146383919436&w=2 http://security-protocols.com/modules.php?name=News&file=article&sid=2783 http://www.kb.cert.org/vuls/id/490628 http://www.microsoft.com/technet/security/advisory/904797.mspx http://www.securityfocus.com/bid/14259 http://www.us-cert.gov/cas/techalerts/TA05-221A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-041 https://oval.cisecurity.org/reposito •