Page 9 of 102 results (0.009 seconds)

CVSS: 10.0EPSS: 51%CPEs: 51EXPL: 0

Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571. El Convertidor de Microsoft Word para Windows 6.0 no valida adecuadamente ciertas longitudes de datos, lo que permite a atacantes remotos ejecutar código de su elección mediante ficheros .wri, .rtf y .doc enviados por correo electrónico o sitios web maliciosos, también llamada "Vulnerabilidad de conversión de fuentes". • http://www.ciac.org/ciac/bulletins/p-055.shtml http://www.idefense.com/application/poi/display?id=162&type=vulnerabilities&flashstatus=true https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041 https://exchange.xforce.ibmcloud.com/vulnerabilities/18338 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1241 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1655 https://oval.cisecurity.org/repository/search/def •

CVSS: 2.1EPSS: 0%CPEs: 5EXPL: 0

"Shatter" style vulnerability in the Window Management application programming interface (API) for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows local users to gain privileges by using certain API functions to change properties of privileged programs using the SetWindowLong and SetWIndowLongPtr API functions. Vulnerabilidad de estilo "hacer añicos" en la interfaz de programación de aplicación (API) de Administración de Windows en Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 permite a usuarios locales ganar privilegios usando ciertas funciones de API para cambiar las propiedades de programas privilegiados usando las funciones de API SetWindowLong y SetWIndowLongPtr. • http://marc.info/?l=bugtraq&m=109777417922695&w=2 http://www.kb.cert.org/vuls/id/218526 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-032 https://exchange.xforce.ibmcloud.com/vulnerabilities/16579 https://exchange.xforce.ibmcloud.com/vulnerabilities/17658 •

CVSS: 7.5EPSS: 22%CPEs: 5EXPL: 2

Network Dynamic Data Exchange (NetDDE) services for Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows attackers to remotely execute arbitrary code or locally gain privileges via a malicious message or application that involves an "unchecked buffer," possibly a buffer overflow. Los servicios Network Dynamic Data Exchange (NetDDE) de Microsoft Windows 98, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 permiten a atacantes ejecutar código de su elección remotamente o ganar privilegios localmente mediante un mensaje o aplicación maliciosos que envuelve un "búfer sin comprobar", posiblemente un desbordamiento de búfer. • https://www.exploit-db.com/exploits/16371 https://www.exploit-db.com/exploits/734 http://marc.info/?l=bugtraq&m=109786703930674&w=2 http://secunia.com/advisories/12803 http://www.kb.cert.org/vuls/id/640488 http://www.securityfocus.com/bid/11372 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-031 https://exchange.xforce.ibmcloud.com/vulnerabilities/16556 https://exchange.xforce.ibmcloud.com/vulnerabilities/17657 https://oval.cisecurity.org/repository&#x •

CVSS: 10.0EPSS: 96%CPEs: 5EXPL: 1

Buffer overflow in Microsoft Internet Explorer and Explorer on Windows XP SP1, WIndows 2000, Windows 98, and Windows Me may allow remote malicious servers to cause a denial of service (application crash) and possibly execute arbitrary code via long share names, as demonstrated using Samba. Desbordamiento de búfer en Microsoft Internet Explorer y Explorador de Windows XP SP1, 2000, 98 y Me puede permitir a usuarios remotos maliciosos causar una denegación de servicio (caída de aplicación) y posiblemente ejecutar código de su elección mediante nombres de recursos compartidos largos, como se ha demostrado usando Samba. • https://www.exploit-db.com/exploits/24051 http://seclists.org/lists/bugtraq/2004/Apr/0322.html http://seclists.org/lists/fulldisclosure/2004/Apr/0933.html http://secunia.com/advisories/11482 http://securitytracker.com/id?1011647 http://support.microsoft.com/default.aspx?scid=kb%3Ben-us%3B322857 http://www.kb.cert.org/vuls/id/616200 http://www.osvdb.org/5687 http://www.securiteam.com/windowsntfocus/5JP0M1PCKI.html http://www.securityfocus.com/bid/10213 https://docs.m •

CVSS: 5.0EPSS: 84%CPEs: 46EXPL: 1

Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html". • http://marc.info/?l=bugtraq&m=109303291513335&w=2 http://marc.info/?l=bugtraq&m=109336221826652&w=2 http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html http://www.kb.cert.org/vuls/id/526089 http://www.securityfocus.com/bid/10973 http://www.us-cert.gov/cas/techalerts/TA04-293A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 https://exchange.xforce.ibmcloud.com/vulnerabilities/17044 https://oval.cisecurity.org/repository/search&# •