Page 92 of 637 results (0.013 seconds)

CVSS: 7.5EPSS: 8%CPEs: 5EXPL: 0

Buffer overflow in the Microsoft Message Queue Manager (MSQM) allows remote attackers to cause a denial of service (RPC service crash) via a queue registration request. Desbordamiento de búfer en Microsof Message Queue Manager (MSQM) permite a atacantes remotos causar una denegación de servicio (caída de servicio RPC) mediante una petición de registro de cola. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-039 https://exchange.xforce.ibmcloud.com/vulnerabilities/13131 •

CVSS: 7.5EPSS: 97%CPEs: 8EXPL: 2

Buffer overflow in the debug functionality in fp30reg.dll of Microsoft FrontPage Server Extensions (FPSE) 2000 and 2002 allows remote attackers to execute arbitrary code via a crafted chunked encoded request. Desbordamiento de búfer en la funcionalidad de depuración en fp30reg.dll de Microsoft FrontPage Server Extensions 2000 y 2002 permite a atacantes remotos ejecutar código mediante una cierta petición en trozos codificada. • https://www.exploit-db.com/exploits/121 https://www.exploit-db.com/exploits/16356 http://marc.info/?l=bugtraq&m=106865318904055&w=2 http://marc.info/?l=ntbugtraq&m=106862654906759&w=2 http://secunia.com/advisories/10195 http://www.kb.cert.org/vuls/id/279156 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-051 https://exchange.xforce.ibmcloud.com/vulnerabilities/13674 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3A •

CVSS: 5.0EPSS: 41%CPEs: 8EXPL: 0

Unknown vulnerability in the SmartHTML interpreter (shtml.dll) in Microsoft FrontPage Server Extensions 2000 and 2002, and Microsoft SharePoint Team Services 2002, allows remote attackers to cause a denial of service (response failure) via a certain request. Vulnerabilidad desconocida en el intérprete SmartHTML interpreter (shtml.dll) en Microsoft FrontPage Server Extensions 2000 y 2002, y Microsoft SharePoint Team Services 2002, permite a atacantes remotos causar una denegación de servicio (fallo de respuesta) mediante una cierta petición. • http://secunia.com/advisories/10195 http://www.kb.cert.org/vuls/id/179012 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-051 https://exchange.xforce.ibmcloud.com/vulnerabilities/13680 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A308 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A591 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A606 https://oval.cis •

CVSS: 7.5EPSS: 96%CPEs: 11EXPL: 5

Stack-based buffer overflow in a logging function for Windows Workstation Service (WKSSVC.DLL) allows remote attackers to execute arbitrary code via RPC calls that cause long entries to be written to a debug log file ("NetSetup.LOG"), as demonstrated using the NetAddAlternateComputerName API. Desbordamiento de búfer en la pila en una función de registro del servicio de Estación de Trabajo de Windows (WKSSVC.DLL) permite a atacantes remotos ejecutar código arbitrario mediante llamadas RPC que hacen que hacen que se escriban entradas largas en el fichero de registro de depuración NetSetup.LOG, como se ha demostrado usando la API NetAddAlternateComputerName. • https://www.exploit-db.com/exploits/123 https://www.exploit-db.com/exploits/130 https://www.exploit-db.com/exploits/119 https://www.exploit-db.com/exploits/16378 http://marc.info/?l=bugtraq&m=106859247713009&w=2 http://marc.info/?l=bugtraq&m=106865197102041&w=2 http://www.cert.org/advisories/CA-2003-28.html http://www.cisco.com/warp/public/707/cisco-sa-20040129-ms03-049.shtml http://www.kb.cert.org/vuls/id/567620 http://www.securityfocus.com/bid&#x •

CVSS: 7.2EPSS: 0%CPEs: 49EXPL: 2

Buffer overflow in a function in User32.dll on Windows NT through Server 2003 allows local users to execute arbitrary code via long (1) LB_DIR messages to ListBox or (2) CB_DIR messages to ComboBox controls in a privileged application. Desbordamiento de búfer en User32.dll en Windows NT a Server 2003 permite a usaurios locales ejcutar código arbitrario mediante mensajes grandes a controles: LB_DIR a ListBox o CB_DIR a ComboBox; en una operación privilegiada. • https://www.exploit-db.com/exploits/23255 https://www.exploit-db.com/exploits/122 http://marc.info/?l=bugtraq&m=106631999907035&w=2 http://marc.info/?l=ntbugtraq&m=106632111408343&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/967668 http://www.securityfocus.com/bid/8827 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-045 https://exchange.xforce.ibmcloud.com/vulnerabilities/13424 https://oval.cisecur •