Page 9 of 79 results (0.007 seconds)

CVSS: 5.0EPSS: 93%CPEs: 296EXPL: 2

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •

CVSS: 5.0EPSS: 0%CPEs: 24EXPL: 3

The IPv6 support in Windows XP SP2, 2003 Server SP1, and Longhorn, with Windows Firewall turned off, allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the SYN flag set and the same destination and source address and port, a variant of CVE-2005-0688 and a reoccurrence of the "Land" vulnerability (CVE-1999-0016). • https://www.exploit-db.com/exploits/861 http://www.ntbugtraq.com/default.aspx?pid=36&sid=1&A2=ind0505&L=NTBUGTRAQ&P=R409&D=0&F=N&H=0&O=D&T=0 http://www.securityfocus.com/bid/13658 http://www.vupen.com/english/advisories/2005/0559 •

CVSS: 5.0EPSS: 73%CPEs: 55EXPL: 1

The TCP/IP stack in multiple operating systems allows remote attackers to cause a denial of service (CPU consumption) via a TCP packet with the correct sequence number but the wrong Acknowledgement number, which generates a large number of "keep alive" packets. NOTE: some followups indicate that this issue could not be replicated. • https://www.exploit-db.com/exploits/25439 http://seclists.org/lists/fulldisclosure/2005/Apr/0358.html http://seclists.org/lists/fulldisclosure/2005/Apr/0383.html http://seclists.org/lists/fulldisclosure/2005/Apr/0385.html http://www.securityfocus.com/bid/13215 https://exchange.xforce.ibmcloud.com/vulnerabilities/40502 •

CVSS: 7.2EPSS: 0%CPEs: 24EXPL: 0

Buffer overflow in the font processing component of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via a specially-designed application. El desbordamiento del búfer en el componente de procesamiento de fuentes de Microsoft Windows 2000, Windows XP SP1 y SP2, y Windows Server 2003 permite a los usuarios locales obtener privilegios a través de una aplicación especialmente diseñada. • http://marc.info/?l=bugtraq&m=111343529426926&w=2 http://www.ngssoftware.com/advisories/ms-01.txt https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2562 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2731 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3941 https://oval.cisecurity.org/repository/search/defin •

CVSS: 7.2EPSS: 0%CPEs: 23EXPL: 0

The kernel of Microsoft Windows 2000, Windows XP SP1 and SP2, and Windows Server 2003 allows local users to gain privileges via certain access requests. El kernel de Microsoft Windows 2000, Windows XP SP1 y SP2, y Windows Server 2003 permite a los usuarios locales obtener privilegios a través de determinadas solicitudes de acceso. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-018 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1656 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1761 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3994 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4593 •