Page 9 of 317 results (0.006 seconds)

CVSS: 7.8EPSS: 42%CPEs: 58EXPL: 3

31 Dec 2004 — Heap-based buffer overflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a crafted .hlp file. El desbordamiento de búfer basado en memoria dinámica (heap) en winhlp32.exe en Windows NT, Windows 2000 a SP4, Windows XP a SP2 y Windows 2003 permite a los atacantes remotos ejecutar código arbitrario a través de un archivo.hlp diseñado. • https://www.exploit-db.com/exploits/25049 •

CVSS: 6.2EPSS: 62%CPEs: 67EXPL: 1

23 Dec 2004 — The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang. • https://www.exploit-db.com/exploits/721 •

CVSS: 8.4EPSS: 19%CPEs: 56EXPL: 1

23 Dec 2004 — Integer underflow in winhlp32.exe in Windows NT, Windows 2000 through SP4, Windows XP through SP2, and Windows 2003 allows remote attackers to execute arbitrary code via a malformed .hlp file, which leads to a heap-based buffer overflow. • http://marc.info/?l=bugtraq&m=110383690219440&w=2 •

CVSS: 10.0EPSS: 22%CPEs: 74EXPL: 0

15 Dec 2004 — HyperTerminal application for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the length of a value that is saved in a session file, which allows remote attackers to execute arbitrary code via a malicious HyperTerminal session file (.ht), web site, or Telnet URL contained in an e-mail message, triggering a buffer overflow. La aplicación Hyperterminal de Windows NT 4.0, 2000, XP y Server 2003 no valida adecuadamente la longitud de un valor guardado en un fichero d... • http://marc.info/?l=bugtraq&m=110312618614849&w=2 •

CVSS: 10.0EPSS: 23%CPEs: 51EXPL: 0

15 Dec 2004 — Microsoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Table Conversion Vulnerability," a different vulnerability than CVE-2004-0901. El Convertidor de Microsoft Word para Windows 6.0 no valida adecuadamente ciertas longitudes de datos, lo que permite a atacantes remotos ejecutar código arbitrario mediante ficheros .wri, .rtf y .doc enviado por ... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-041 •

CVSS: 7.8EPSS: 1%CPEs: 57EXPL: 0

15 Dec 2004 — The Local Procedure Call (LPC) interface of the Windows Kernel for Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 does not properly validate the lengths of messages sent to the LPC port, which allows local users to gain privileges, aka "Windows Kernel Vulnerability." La interfaz de Llamada a Procedimiento Local (LPC) en el kernel de Windows NT 4.0, Windows 2000, Windows XP, y Windows Server 2003 no valida adecuadamente la longitud de mensajes enviádos al puerto LCP, lo que permite a usuar... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-044 •

CVSS: 7.5EPSS: 37%CPEs: 40EXPL: 0

15 Dec 2004 — The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition, with DHCP logging enabled, does not properly validate the length of certain messages, which allows remote attackers to cause a denial of service (application crash) via a malformed DHCP message, aka "Logging Vulnerability." El servidor DHCP de Microsoft Windows NT 4.0 Server y Terminal Server Edition, cuando está activado el registro de actividad de DHCP, no valida adecuadamente la longitud de ciertos mensajes, lo que p... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042 •

CVSS: 10.0EPSS: 41%CPEs: 40EXPL: 0

15 Dec 2004 — The DHCP Server service for Microsoft Windows NT 4.0 Server and Terminal Server Edition does not properly validate the length of certain messages, which allows remote attackers to execute arbitrary code via a malformed DHCP message, aka the "DHCP Request Vulnerability." El servidor DHCP de Microsoft Windows NT 4.0 Server y Terminal Server Edition no valida adecuadamente la longitud de ciertos mensajes, lo que permite a atacantes remotos ejecutar código de su elección mediante mensajes DHCP malformados, tamb... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-042 •

CVSS: 10.0EPSS: 26%CPEs: 51EXPL: 0

15 Dec 2004 — Microsoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly validate certain data lengths, which allows remote attackers to execute arbitrary code via a .wri, .rtf, and .doc file sent by email or malicious web site, aka "Font Conversion Vulnerability," a different vulnerability than CVE-2004-0571. El Convertidor de Microsoft Word para Windows 6.0 no valida adecuadamente ciertas longitudes de datos, lo que permite a atacantes remotos ejecutar código de su elección mediante ... • http://www.ciac.org/ciac/bulletins/p-055.shtml •

CVSS: 10.0EPSS: 89%CPEs: 37EXPL: 2

01 Dec 2004 — The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Association Context Vulnerability." El servicio WINS (wins.exe) de Microsoft Windows NT Server 4.0, Windows 2000 Server y Windows Server 2003 permite a atacantes remotos escribir localizaciones de memoria arbitrarias y p... • https://www.exploit-db.com/exploits/909 •