Page 78 of 637 results (0.014 seconds)

CVSS: 5.0EPSS: 23%CPEs: 8EXPL: 4

The Web View DLL (webvw.dll), as used in Windows Explorer on Windows 2000 systems, does not properly filter an apostrophe ("'") in the author name in a document, which allows attackers to execute arbitrary script via extra attributes when Web View constructs a mailto: link for the preview pane when the user selects the file. • https://www.exploit-db.com/exploits/25454 http://security.greymagic.com/security/advisories/gm015-ie http://www.securityfocus.com/archive/1/396224 http://www.securityfocus.com/bid/13248 http://www.vupen.com/english/advisories/2005/0509 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-024 https://exchange.xforce.ibmcloud.com/vulnerabilities/20380 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3585 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

Buffer overflow in Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to cause a denial of service (i.e., system crash) via a malformed request, aka "Object Management Vulnerability". • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1271 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2043 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4397 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4832 •

CVSS: 7.5EPSS: 23%CPEs: 15EXPL: 3

Microsoft Windows XP SP2 and earlier, 2000 SP3 and SP4, Server 2003, and older operating systems allows remote attackers to cause a denial of service and possibly execute arbitrary code via crafted IP packets with malformed options, aka the "IP Validation Vulnerability." • https://www.exploit-db.com/exploits/942 https://www.exploit-db.com/exploits/25383 https://www.exploit-db.com/exploits/25384 http://www.kb.cert.org/vuls/id/233754 http://www.us-cert.gov/cas/techalerts/TA05-102A.html http://xforce.iss.net/xforce/alerts/id/192 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-019 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1744 https://oval.cisecurity.org/repository/sear •

CVSS: 10.0EPSS: 96%CPEs: 17EXPL: 2

Buffer overflow in the Message Queuing component of Microsoft Windows 2000 and Windows XP SP1 allows remote attackers to execute arbitrary code via a crafted message. Desbordamiento de búfer en el componente Message Queuing -cola de mensaje- en Microsoft Windows 2000 y Windows XP SP1, permite a atacantes remotos ejecutar código de su elección a través de un mensaje manipulado. • https://www.exploit-db.com/exploits/16747 https://www.exploit-db.com/exploits/1075 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-017 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4384 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4988 •

CVSS: 10.0EPSS: 1%CPEs: 4EXPL: 1

Stack-based buffer overflow in WINSRV.DLL in the Client Server Runtime System (CSRSS) process of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application that provides console window information with a long FaceName value. • https://www.exploit-db.com/exploits/1198 http://www.idefense.com/application/poi/display?id=230&type=vulnerabilities https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1822 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A266 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3544 https://oval.cisecurity.org/repository&#x •