Page 85 of 431 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 49EXPL: 2

Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application. Desbordamiento de búfer en User32.dll en Windows NT a Server 2003 permite a usaurios locales ejcutar código arbitrario mediante mensajes grandes a controles: LB_DIR a ListBox o CB_DIR a ComboBox; en una operación privilegiada. • https://www.exploit-db.com/exploits/23255 https://www.exploit-db.com/exploits/122 http://marc.info/?l=bugtraq&m=106631999907035&w=2 http://marc.info/?l=ntbugtraq&m=106632111408343&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/967668 http://www.securityfocus.com/bid/8827 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-045 https://exchange.xforce.ibmcloud.com/vulnerabilities/13424 https://oval.cisecur •

CVSS: 7.5EPSS: 97%CPEs: 48EXPL: 5

The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack. El servicio de mensajería de Windows NT a Server 2003 no verifica adecuadamente la longitud del mensaje, lo que permite a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/385 https://www.exploit-db.com/exploits/111 https://www.exploit-db.com/exploits/135 https://www.exploit-db.com/exploits/23247 http://marc.info/?l=bugtraq&m=106666713812158&w=2 http://marc.info/?l=ntbugtraq&m=106632188709562&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/575892 http://www.securityfocus.com/bid/8826 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003 •

CVSS: 7.5EPSS: 13%CPEs: 49EXPL: 0

The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers to execute arbitrary code without user approval. La capacidad Authenticode en Microsoft Windows NT hasta Server 2003 no pide al usuario confirmación para descargar e instalar controles ActiveX cuanto el sistema está bajo de memoria, lo que podría permitir a atacantes remotos ejecutar código arbitrario sin aprovación del usuario. • http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/838572 http://www.securityfocus.com/bid/8830 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-041 https://exchange.xforce.ibmcloud.com/vulnerabilities/13422 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A185 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A198 •

CVSS: 7.5EPSS: 53%CPEs: 48EXPL: 0

Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL. Desbordamiento de búfer en la pila en el sistema PCHealht en el Centro de Ayuda y Soporte de Windows XP y Windows 2003 Server permite a atacantes remotos ejecutar código arbitrario mediante una petición larga en la URL HCP. • http://marc.info/?l=bugtraq&m=106631908105696&w=2 http://marc.info/?l=ntbugtraq&m=106632194809632&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/467036 http://www.ngssoftware.com/advisories/ms-pchealth.txt http://www.securityfocus.com/bid/8828 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-044 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A217 https://oval.cisecurity •

CVSS: 5.0EPSS: 48%CPEs: 1EXPL: 0

Directory traversal vulnerability in the "Shell Folders" capability in Microsoft Windows Server 2003 allows remote attackers to read arbitrary files via .. (dot dot) sequences in a "shell:" link. Vulnerabilidad de atravesamiento de directorios en la capacidad de "Shell Folders" en Microsoft Windows Server 2003 permite a atacantes remotos leer ficheros arbitrarios mediante secuencias .. (punto punto) en un enlace "shell:" • http://marc.info/?l=bugtraq&m=106563075612028&w=2 http://www.geocities.co.jp/SiliconValley/1667/advisory08e.html •