Page 8 of 214 results (0.004 seconds)

CVSS: 9.8EPSS: 46%CPEs: 42EXPL: 0

10 Jul 2003 — Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required. Desbordamiento de búfer en el Bloque de Mensajes de Servidor (SMB) en Microsoft Windows XP, 2000 y NT permite a atacantes remotos causar la Denegación de Servicios (DoS) y posiblemente ejecutar código arbitrario mediante un paquete SMB que especifica una longitud de búfe... • http://secunia.com/advisories/9225 •

CVSS: 9.8EPSS: 51%CPEs: 10EXPL: 1

28 Jun 2003 — Buffer overflow in the HTML Converter (HTML32.cnv) on various Windows operating systems allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via cut-and-paste operation, as demonstrated in Internet Explorer 5.0 using a long "align" argument in an HR tag. Desbordamiento de búfer en el Convertidor HTML (HTML32.cnv) de varios sistemas operativos Windows, permite a atacantes remotos causar una denegación de servicio (caída) y posiblemente ejecutar código arbitrario me... • https://www.exploit-db.com/exploits/22824 •

CVSS: 9.8EPSS: 48%CPEs: 2EXPL: 1

30 May 2003 — The logging capability for unicast and multicast transmissions in the ISAPI extension for Microsoft Windows Media Services in Microsoft Windows NT 4.0 and 2000, nsiislog.dll, allows remote attackers to cause a denial of service in Internet Information Server (IIS) and execute arbitrary code via a certain network request. La librería nsisslog.dll de la extensión ISAPI de Microsoft Winodws Media Services en Windows NT 4.0 y 2000 permite que atacante remotos provoquen una denegación de servicio en el Internet ... • https://www.exploit-db.com/exploits/56 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 3%CPEs: 45EXPL: 0

26 Apr 2003 — Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger. Desbordamiento de búfer en el Kernel de Windows permite a usuarios locales ganar privilegios haciendo que ciertos mensajes de error sean pasados a un depurador. • http://www.kb.cert.org/vuls/id/446338 •

CVSS: 7.5EPSS: 58%CPEs: 45EXPL: 5

26 Mar 2003 — The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference. La pila DCE-RPC en Windows 2000 y otros sistemas operativos permite a atacantes remotos causar una denegación de servicio (desactivar el servico RCP) mediante un paquete malformado al puerto TCP 135, que dispara una desreferencia a un puntero nulo. • https://www.exploit-db.com/exploits/21951 •

CVSS: 8.8EPSS: 18%CPEs: 46EXPL: 0

21 Mar 2003 — Integer overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack. Desbordamiento de enteros en JsArrayFunctionHeapSort usado en el Motor de script Windows de JScript (JScript.dll) en varios sistemas operativos Windows permite a atacantes remotos ejecutar có... • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0139.html •

CVSS: 7.8EPSS: 21%CPEs: 45EXPL: 2

07 Feb 2003 — Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information. Desbordamiento de búfer en el servicio Localizador de Windows NT 4.0, Windows NT 4.0 Terminal server Edition, Windows 2000, y Windows XP permite a usuarios locales ejecutar código arbitrario mediante una llamada RPC al servicio conteniendo cierta infor... • https://www.exploit-db.com/exploits/5 •

CVSS: 7.5EPSS: 40%CPEs: 26EXPL: 3

31 Dec 2002 — Microsoft Windows 2000 allows remote attackers to cause a denial of service (memory consumption) by sending a flood of empty TCP/IP packets with the ACK and FIN bits set to the NetBIOS port (TCP/139), as demonstrated by stream3. • https://www.exploit-db.com/exploits/21246 •

CVSS: 6.8EPSS: 1%CPEs: 31EXPL: 0

31 Dec 2002 — The screensaver on Windows NT 4.0, 2000, XP, and 2002 does not verify if a domain account has already been locked when a valid password is provided, which makes it easier for users with physical access to conduct brute force password guessing. • http://cert.uni-stuttgart.de/archive/bugtraq/2002/01/msg00278.html •

CVSS: 7.8EPSS: 0%CPEs: 37EXPL: 0

31 Dec 2002 — NT Virtual DOS Machine (NTVDM.EXE) in Windows 2000, NT and XP does not verify user execution permissions for 16-bit executable files, which allows local users to bypass the loader and execute arbitrary programs. NT Virtual DOS Machine (NTVDM.EXE) en Windows 2000, NT y XP no verifica los permisos de ejecución del usuario para archivos ejecutables de 16 bits, lo que permite a los usuarios locales pasar por alto el cargador y ejecutar programas arbitrarios. • http://archives.neohapsis.com/archives/bugtraq/2002-09/0211.html • CWE-264: Permissions, Privileges, and Access Controls •