Page 93 of 637 results (0.009 seconds)

CVSS: 7.5EPSS: 97%CPEs: 48EXPL: 5

The Messenger Service for Windows NT through Server 2003 does not properly verify the length of the message, which allows remote attackers to execute arbitrary code via a buffer overflow attack. El servicio de mensajería de Windows NT a Server 2003 no verifica adecuadamente la longitud del mensaje, lo que permite a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • https://www.exploit-db.com/exploits/385 https://www.exploit-db.com/exploits/111 https://www.exploit-db.com/exploits/135 https://www.exploit-db.com/exploits/23247 http://marc.info/?l=bugtraq&m=106666713812158&w=2 http://marc.info/?l=ntbugtraq&m=106632188709562&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/575892 http://www.securityfocus.com/bid/8826 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003 •

CVSS: 7.5EPSS: 13%CPEs: 49EXPL: 0

The Authenticode capability in Microsoft Windows NT through Server 2003 does not prompt the user to download and install ActiveX controls when the system is low on memory, which could allow remote attackers to execute arbitrary code without user approval. La capacidad Authenticode en Microsoft Windows NT hasta Server 2003 no pide al usuario confirmación para descargar e instalar controles ActiveX cuanto el sistema está bajo de memoria, lo que podría permitir a atacantes remotos ejecutar código arbitrario sin aprovación del usuario. • http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/838572 http://www.securityfocus.com/bid/8830 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-041 https://exchange.xforce.ibmcloud.com/vulnerabilities/13422 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A185 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A198 •

CVSS: 9.3EPSS: 96%CPEs: 5EXPL: 2

Buffer overflow in Troubleshooter ActiveX Control (Tshoot.ocx) in Microsoft Windows 2000 SP4 and earlier allows remote attackers to execute arbitrary code via an HTML document with a long argument to the RunQuery2 method. Desbordamiento de búfer en el control ActiveX de resolución de problemas (Tshoot.ocx) en Microsoft Windows 2000 SP4 y anteriores permite a atacantes remotos ejecutar código arbitrario mediante un correo HTML o una página web. • http://archives.neohapsis.com/archives/vulnwatch/2003-q4/0015.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/012205.html http://marc.info/?l=ntbugtraq&m=106632192709608&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/989932 http://www.securityfocus.com/bid/8833 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-042 https://exchange.xforce.ibmcloud.com/vulnerabilities/13423 https://oval.cisecurity& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 53%CPEs: 48EXPL: 0

Stack-based buffer overflow in the PCHealth system in the Help and Support Center function in Windows XP and Windows Server 2003 allows remote attackers to execute arbitrary code via a long query in an HCP URL. Desbordamiento de búfer en la pila en el sistema PCHealht en el Centro de Ayuda y Soporte de Windows XP y Windows 2003 Server permite a atacantes remotos ejecutar código arbitrario mediante una petición larga en la URL HCP. • http://marc.info/?l=bugtraq&m=106631908105696&w=2 http://marc.info/?l=ntbugtraq&m=106632194809632&w=2 http://www.cert.org/advisories/CA-2003-27.html http://www.kb.cert.org/vuls/id/467036 http://www.ngssoftware.com/advisories/ms-pchealth.txt http://www.securityfocus.com/bid/8828 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-044 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A217 https://oval.cisecurity •

CVSS: 5.1EPSS: 67%CPEs: 10EXPL: 0

A multi-threaded race condition in the Windows RPC DCOM functionality with the MS03-039 patch installed allows remote attackers to cause a denial of service (crash or reboot) by causing two threads to process the same RPC request, which causes one thread to use memory after it has been freed, a different vulnerability than CVE-2003-0352 (Blaster/Nachi), CVE-2003-0715, and CVE-2003-0528, and as demonstrated by certain exploits against those vulnerabilities. Una condición de carrera entre hebras de ejecución el la funcionalidad RPC DCOM de Windows con el parche MS03-039 instalado permite a atacantes remotos causar una denegación de servicio (caída o reinicio) haciendo que dos hebras procesen la misma petición RPC, lo que hace que una use memoria después de que haya sido liberada, una vulnerabilidad distinta de CAN-2003-0352 (Blaster/Nachi), CAN-2003-0715, y CAN-2003-0528, and que ha sido demostrada por ciertos "exploits" contra estas vulnerabilidades. • http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011870.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011886.html http://lists.grok.org.uk/pipermail/full-disclosure/2003-October/011901.html http://marc.info/?l=bugtraq&m=106579825211708&w=2 http://marc.info/?l=bugtraq&m=106588827513795&w=2 http://marc.info/?l=ntbugtraq&m=106580303918155&w=2 http://www.kb.cert.org/vuls/id/547820 http://www.securityfocus.com/bid/8811 http://www • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •