Page 84 of 431 results (0.030 seconds)

CVSS: 7.5EPSS: 40%CPEs: 6EXPL: 0

Unknown vulnerability in the H.323 protocol implementation in Windows 98, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code. Vulnerabilidad desconocida en la implementación del protocolo H.323 en Microsoft Windows 98, Windows 2000, Windows XP, y Windows Server 2003 permite a atacantes remotos ejecutar código arbitrario. • http://www.ciac.org/ciac/bulletins/o-114.shtml http://www.kb.cert.org/vuls/id/353956 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-011 https://exchange.xforce.ibmcloud.com/vulnerabilities/15710 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A907 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A946 https://oval.cisecurity.org/re •

CVSS: 2.6EPSS: 1%CPEs: 7EXPL: 0

The DCOM RPC interface for Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to cause network communications via an "alter context" call that contains additional data, aka the "Object Identity Vulnerability." El interfaz RPC DCOM de Microsoft Windows NT 4.0, 2000, XP y Server 2003 permite a atacantes remotos causar comunicaciones de red mediante una llamada de "alterar contexto" conteniendo datos adicionales, también conocida como "Vulnerabilidad de Identidad de Objeto". • http://secunia.com/advisories/11065 http://www.ciac.org/ciac/bulletins/o-115.shtml http://www.kb.cert.org/vuls/id/212892 http://www.securityfocus.com/bid/10121 http://www.us-cert.gov/cas/techalerts/TA04-104A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-012 https://exchange.xforce.ibmcloud.com/vulnerabilities/15711 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1041 https://oval.cisecurity.org/repository/ •

CVSS: 9.3EPSS: 96%CPEs: 34EXPL: 0

The Windows Internet Naming Service (WINS) for Microsoft Windows Server 2003, and possibly Windows NT and Server 2000, does not properly validate the length of certain packets, which allows attackers to cause a denial of service and possibly execute arbitrary code. El Servicio de Nombres de Internet de Windows (WINS) en Microsoft Windows Server 2003, y posiblemente Windows NT y Server 2000 no valida adecuadamente la longitud de ciertos paquetes, lo que permite a ciertos paquetes causar una denegación de servicio y posiblemente ejecutar código arbitrario. • http://www.ciac.org/ciac/bulletins/o-077.shtml http://www.kb.cert.org/vuls/id/445214 http://www.osvdb.org/3903 http://www.securityfocus.com/bid/9624 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-006 https://exchange.xforce.ibmcloud.com/vulnerabilities/15037 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A704 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A800 https://oval.c • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 97%CPEs: 38EXPL: 3

Multiple integer overflows in Microsoft ASN.1 library (MSASN1.DLL), as used in LSASS.EXE, CRYPT32.DLL, and other Microsoft executables and libraries on Windows NT 4.0, 2000, and XP, allow remote attackers to execute arbitrary code via ASN.1 BER encodings with (1) very large length fields that cause arbitrary heap data to be overwritten, or (2) modified bit strings. Múltiples desbordamientos de enteros en la librería ASN.1 de Microsoft (MSASN1.DLL), usada en LSASS.EXE, CRYPT32.DLL, y otros ejecutables de Microsoft y librerías en Windows NT/2000/XP, permite a atacantes remotos ejecutar código arbitrario mediante codificaciones ASN.1 BER con campos de longitud muy largos que hace que se sobreescriban datos arbitrarios del montón. • https://www.exploit-db.com/exploits/153 https://www.exploit-db.com/exploits/16377 https://www.exploit-db.com/exploits/3022 http://marc.info/?l=bugtraq&m=107643836125615&w=2 http://marc.info/?l=bugtraq&m=107643892224825&w=2 http://marc.info/?l=ntbugtraq&m=107650972617367&w=2 http://marc.info/?l=ntbugtraq&m=107650972723080&w=2 http://www.kb.cert.org/vuls/id/216324 http://www.kb.cert.org/vuls/id/583108 http://www.us-cert.gov/cas/techalerts/TA04 •

CVSS: 6.0EPSS: 2%CPEs: 7EXPL: 0

Microsoft Exchange 2003 and Outlook Web Access (OWA), when configured to use NTLM authentication, does not properly reuse HTTP connections, which can cause OWA users to view mailboxes of other users when Kerberos has been disabled as an authentication method for IIS 6.0, e.g. when SharePoint Services 2.0 is installed. Microsoft Exchange 2003 y Outlook Web Access (OWA), cuando usan SharePoint Services 2.0, hace que la autenticación Kerberos se desactive para IIS, lo que puede causar que usuarios de OWA vean los buzones de correo de otros usuarios. • http://secunia.com/advisories/10615 http://www.kb.cert.org/vuls/id/530660 http://www.microsoft.com/exchange/support/e2k3owa.asp http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0311&L=ntbugtraq&F=P&S=&P=9281 http://www.securityfocus.com/bid/9118 http://www.securityfocus.com/bid/9409 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-002 https://exchange.xforce.ibmcloud.com/vulnerabilities/13869 https://oval.cisecurity.org/repository/search&#x • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •