CVE-2004-0726
https://notcve.org/view.php?id=CVE-2004-0726
The Windows Media Player control in Microsoft Windows 2000 allows remote attackers to execute arbitrary script in the local computer zone via an ASX filename that contains javascript, which is executed in the local context in a preview panel. El control de Windows Media Player en Windows 2000 permite a atacantes remotos ejecutar script de su elección en la zona de ordenador local mediante un nombre de fichero ASX que contiene javascript, que es ejecuado en el contexto local en el panel de vista previa. • http://marc.info/?l=bugtraq&m=108965512912175&w=2 http://www.securityfocus.com/bid/10693 https://exchange.xforce.ibmcloud.com/vulnerabilities/16704 •
CVE-2004-0210 – Microsoft Windows Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2004-0210
The POSIX component of Microsoft Windows NT and Windows 2000 allows local users to execute arbitrary code via certain parameters, possibly by modifying message length values and causing a buffer overflow. El componente POSIX de Microsoft Windows NT y Windows 2000 permite a usuarios locales ejecutar código de su elección mediante ciertos parámetros, posiblemente modificando valores de tamaño de mensaje y causando un desbordamiento de búfer. A privilege elevation vulnerability exists in the POSIX subsystem. This vulnerability could allow a logged on user to take complete control of the system. • https://www.exploit-db.com/exploits/24277 http://www.kb.cert.org/vuls/id/647436 http://www.us-cert.gov/cas/techalerts/TA04-196A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-020 https://exchange.xforce.ibmcloud.com/vulnerabilities/16590 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2166 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2847 •
CVE-2004-0213 – Microsoft Windows Server 2000 - POSIX Subsystem Privilege Escalation (MS04-020)
https://notcve.org/view.php?id=CVE-2004-0213
Utility Manager in Windows 2000 launches winhlp32.exe while Utility Manager is running with raised privileges, which allows local users to gain system privileges via a "Shatter" style attack that sends a Windows message to cause Utility Manager to launch winhlp32 by directly accessing the context sensitive help and bypassing the GUI, then sending another message to winhlp32 in order to open a user-selected file, a different vulnerability than CVE-2003-0908. El Adminstrador de Útiles en Windows 2000 lanza winhlp32.exe mientras que el Administrador de útiles se está ejecutando con privilegios elevados, lo que permite a usuarios locales ganar privilegios de sistema mediante un ataque de estilo "estallamiento" (shatter) que envía un mensaje de Windows para hacer que el Administrador de Útiles lance winhlp32 accediendo directamente a la ayuda sensible al contexto y saltándose el interfaz de usuario (GUI), y entonces enviando otro mensaje a winhlp32 para abrir un fichero seleccionado por el usuario, una vulnerabilidad distinta de CAN 2003-0908. • https://www.exploit-db.com/exploits/351 https://www.exploit-db.com/exploits/352 https://www.exploit-db.com/exploits/355 https://www.exploit-db.com/exploits/350 http://marc.info/?l=bugtraq&m=108975382413405&w=2 http://www.kb.cert.org/vuls/id/868580 http://www.us-cert.gov/cas/techalerts/TA04-196A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-019 https://exchange.xforce.ibmcloud.com/vulnerabilities/16592 https://oval.cisecurity. • CWE-306: Missing Authentication for Critical Function •
CVE-2004-0212 – Microsoft Windows Task Scheduler (XP/2000) - '.job' (MS04-022)
https://notcve.org/view.php?id=CVE-2004-0212
Stack-based buffer overflow in the Task Scheduler for Windows 2000 and XP, and Internet Explorer 6 on Windows NT 4.0, allows local or remote attackers to execute arbitrary code via a .job file containing long parameters, as demonstrated using Internet Explorer and accessing a .job file on an anonymous share. Vulnerabilidad basada en la pila en el Programador de Tareas de Windows 2000 y XP, e Internet Explorer 6 en Windows NT 4.0 permite a atacantes remotos o locales ejecutar código de su elección mediante un fichero .job conteniendo parámetros grandes, como se ha demostrado utlizando Internet Explorer y accediendo a un fichero .job en una carpeta de red compartida anónimamente. • https://www.exploit-db.com/exploits/353 https://www.exploit-db.com/exploits/368 http://marc.info/?l=bugtraq&m=108981273009250&w=2 http://marc.info/?l=bugtraq&m=108981403025596&w=2 http://secunia.com/advisories/12060 http://www.kb.cert.org/vuls/id/228028 http://www.ngssoftware.com/advisories/mstaskjob.txt http://www.us-cert.gov/cas/techalerts/TA04-196A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-022 https://exchange.xforce •
CVE-2004-0201
https://notcve.org/view.php?id=CVE-2004-0201
Heap-based buffer overflow in the HtmlHelp program (hh.exe) in HTML Help for Microsoft Windows 98, Me, NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary commands via a .CHM file with a large length field, a different vulnerability than CVE-2003-1041. Vulnerabilidad basada en el montón en el programa HtmlHelp (hh.exe) en ayuda HTML de Microsoft Windows 98, Me, NT, 4.0, 2000, XP y Server 2003 permite a atacantes remotos ejecutar órdenes de su elección mediante un fichero .CHML con un campo de longitud largo, una vulnerabilidad distinta de CAN-2003-1041. • http://lists.grok.org.uk/pipermail/full-disclosure/2004-July/023919.html http://www.kb.cert.org/vuls/id/920060 http://www.us-cert.gov/cas/techalerts/TA04-196A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023 https://exchange.xforce.ibmcloud.com/vulnerabilities/16586 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1503 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1530 https:/ •