Page 76 of 637 results (0.012 seconds)

CVSS: 7.2EPSS: 0%CPEs: 34EXPL: 0

Buffer overflow in a certain USB driver, as used on Microsoft Windows, allows attackers to execute arbitrary code. Desbordamiento de búfer en cierto driver USB, usado en Windows, permite que atacantes ejecuten código arbitrario. • http://secunia.com/advisories/16210 http://securitytracker.com/id?1014566 http://www.eweek.com/article2/0%2C1759%2C1840131%2C00.asp http://www.osvdb.org/18493 http://www.securityfocus.com/bid/14376 https://exchange.xforce.ibmcloud.com/vulnerabilities/21539 •

CVSS: 5.0EPSS: 0%CPEs: 13EXPL: 2

netman.dll in Microsoft Windows Connections Manager Library allows local users to cause a denial of service (Network Connections Service crash) via a large integer argument to a particular function, aka "Network Connection Manager Vulnerability." netman.dll en Microsoft Windows Connections Manager Library permite que usuarios locales causen una denegación de servicio (caída de Network Connectios Service) mediante un argumento grande a una cierta función, también conocido como "Vulnerabilidad de Administración de conexión de red". • https://www.exploit-db.com/exploits/1104 http://secunia.com/advisories/16065 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.securityfocus.com/bid/14260 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-045 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1250 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre •

CVSS: 5.0EPSS: 58%CPEs: 2EXPL: 0

Windows NT 4.0 and Windows 2000 before URP1 for Windows 2000 SP4 does not properly prevent NULL sessions from accessing certain alternate named pipes, which allows remote attackers to (1) list Windows services via svcctl or (2) read eventlogs via eventlog. • http://marc.info/?l=bugtraq&m=112076409813099&w=2 http://secunia.com/advisories/14189 http://securitytracker.com/id?1014417 http://www.hsc.fr/ressources/presentations/null_sessions http://www.securityfocus.com/bid/14177 http://www.securityfocus.com/bid/14178 https://exchange.xforce.ibmcloud.com/vulnerabilities/21286 https://exchange.xforce.ibmcloud.com/vulnerabilities/21288 •

CVSS: 7.5EPSS: 55%CPEs: 5EXPL: 0

Buffer overflow in the Server Message Block (SMB) functionality for Microsoft Windows 2000, XP SP1 and SP2, and Server 2003 and SP1 allows remote attackers to execute arbitrary code via unknown vectors, aka the "Server Message Block Vulnerability." • http://secunia.com/advisories/15694 http://www.kb.cert.org/vuls/id/489397 http://www.us-cert.gov/cas/techalerts/TA05-165A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-027 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1142 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A259 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A467 •

CVSS: 5.1EPSS: 15%CPEs: 49EXPL: 0

Microsoft Agent allows remote attackers to spoof trusted Internet content and execute arbitrary code by disguising security prompts on a malicious Web page. Microsoft Agent permite a los atacantes remotos falsificar contenido de Internet de confianza y ejecutar código arbitrario disfrazando las indicaciones de seguridad en una página web maliciosa. • http://secunia.com/advisories/15689 http://www.securityfocus.com/bid/13948 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-032 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1194 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A682 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A906 •