Page 84 of 637 results (0.020 seconds)

CVSS: 10.0EPSS: 97%CPEs: 37EXPL: 2

The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." El servicio WINS (wins.exe) de Microsoft Windows NT Server 4.0, Windows 2000 Server y Windows Server 2003 permite a atacantes remotos escribir localizaciones de memoria arbitrarias y posiblemente ejecutar código arbitrario mediante un puntero de memoria modificado en un paquete de replicación WINS al puerto TCP 42. • https://www.exploit-db.com/exploits/909 https://www.exploit-db.com/exploits/16359 http://marc.info/?l=bugtraq&m=110150370506704&w=2 http://secunia.com/advisories/13328 http://securitytracker.com/id?1012516 http://support.microsoft.com/kb/890710 http://www.ciac.org/ciac/bulletins/p-054.shtml http://www.immunitysec.com/downloads/instantanea.pdf http://www.kb.cert.org/vuls/id/145134 http://www.osvdb.org/12378 http://www.securityfocus.com/bid/11763 http:// •

CVSS: 10.0EPSS: 7%CPEs: 22EXPL: 0

Heap-based buffer overflow in the Hrtbeat.ocx (Heartbeat) ActiveX control for Internet Explorer 5.01 through 6, when users who visit online gaming sites that are associated with MSN, allows remote attackers to execute arbitrary code via the SetupData parameter. • http://marc.info/?l=bugtraq&m=110616221411579&w=2 http://www.kb.cert.org/vuls/id/673134 http://www.ngssoftware.com/advisories/heartbeatfull.txt http://www.securityfocus.com/bid/11367 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 https://exchange.xforce.ibmcloud.com/vulnerabilities/17714 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 14%CPEs: 5EXPL: 2

Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow. Los servicios Network Dynamic Data Exchange (NetDDE) de Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 permiten a atacantes ejecutar código de su elección remotamente o ganar privilegios localmente mediante un mensaje o aplicación maliciosos que envuelve un "búfer sin comprobar", posiblemente un desbordamiento de búfer. • https://www.exploit-db.com/exploits/16371 https://www.exploit-db.com/exploits/734 http://marc.info/?l=bugtraq&m=109786703930674&w=2 http://secunia.com/advisories/12803 http://www.kb.cert.org/vuls/id/640488 http://www.securityfocus.com/bid/11372 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031 https://exchange.xforce.ibmcloud.com/vulnerabilities/16556 https://exchange.xforce.ibmcloud.com/vulnerabilities/17657 https://oval.cisecurity.org/repository&#x •

CVSS: 10.0EPSS: 67%CPEs: 3EXPL: 1

Unknown vulnerability in the Graphics Rendering Engine processes of Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code via (1) Windows Metafile (WMF) or (2) Enhanced Metafile (EMF) image formats that involve "an unchecked buffer." Vulnerabilidad desconocida en los procesos del Motor de Generación de Gráficos de Microsoft Windows 2000, Windows XP, y Windows Server 2003 permite a atacantes remotos ejecutar código de su elección mediante formatos de imagen (1) Metafichero de Windows (WMF) o (2) Metafichero Mejorado (EMF) que tiene que ver con "un búfer no comprobado" • https://www.exploit-db.com/exploits/584 http://marc.info/?l=bugtraq&m=109829067325779&w=2 http://www.kb.cert.org/vuls/id/806278 http://www.securityfocus.com/bid/11375 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/16581 https://exchange.xforce.ibmcloud.com/vulnerabilities/17658 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1872 https://oval.cisecurity.org/repos •

CVSS: 10.0EPSS: 96%CPEs: 5EXPL: 1

Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba. Desbordamiento de búfer en Microsoft Internet Explorer y Explorador de Windows XP SP1, 2000, 98 y Me puede permitir a usuarios remotos maliciosos causar una denegación de servicio (caída de aplicación) y posiblemente ejecutar código de su elección mediante nombres de recursos compartidos largos, como se ha demostrado usando Samba. • https://www.exploit-db.com/exploits/24051 http://seclists.org/lists/bugtraq/2004/Apr/0322.html http://seclists.org/lists/fulldisclosure/2004/Apr/0933.html http://secunia.com/advisories/11482 http://securitytracker.com/id?1011647 http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3B322857 http://www.kb.cert.org/vuls/id/616200 http://www.osvdb.org/5687 http://www.securiteam.com/windowsntfocus/5JP0M1PCKI.html http://www.securityfocus.com/bid/10213 https://docs.m •