Page 97 of 637 results (0.005 seconds)

CVSS: 7.5EPSS: 5%CPEs: 11EXPL: 1

The ByteCode Verifier component of Microsoft Virtual Machine (VM) build 5.0.3809 and earlier, as used in Windows and Internet Explorer, allows remote attackers to bypass security checks and execute arbitrary code via a malicious Java applet, aka "Flaw in Microsoft VM Could Enable System Compromise." El componente Verificador de ByteCode de la Máquina Virtual (VW) de Microsoft compilación 5.0.3809 y anteriores, usada en en Windows y en Internet Explorer, permite a atacantes remotos eludir comprobaciones de seguridad y ejecutar código arbitrario mediante un applet de Java malicioso, también conocido como "Fallo en Microsoft VW Podría Permitir Compromiso del Sistema" • https://www.exploit-db.com/exploits/22027 http://www.iss.net/security_center/static/11751.php http://www.kb.cert.org/vuls/id/447569 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-011 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A136 •

CVSS: 5.0EPSS: 44%CPEs: 45EXPL: 5

The RPC component in Windows 2000, Windows NT 4.0, and Windows XP allows remote attackers to cause a denial of service (disabled RPC service) via a malformed packet to the RPC Endpoint Mapper at TCP port 135, which triggers a null pointer dereference. La pila DCE-RPC en Windows 2000 y otros sistemas operativos permite a atacantes remotos causar una denegación de servicio (desactivar el servico RCP) mediante un paquete malformado al puerto TCP 135, que dispara una desreferencia a un puntero nulo. • https://www.exploit-db.com/exploits/21951 https://www.exploit-db.com/exploits/21953 https://www.exploit-db.com/exploits/21954 https://www.exploit-db.com/exploits/21952 http://www.kb.cert.org/vuls/id/261537 http://www.securityfocus.com/archive/1/296114/2002-10-14/2002-10-20/0 http://www.securityfocus.com/bid/6005 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-010 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •

CVSS: 7.5EPSS: 10%CPEs: 46EXPL: 0

Integer overflow in JsArrayFunctionHeapSort function used by Windows Script Engine for JScript (JScript.dll) on various Windows operating system allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail that uses a large array index value that enables a heap-based buffer overflow attack. Desbordamiento de enteros en JsArrayFunctionHeapSort usado en el Motor de script Windows de JScript (JScript.dll) en varios sistemas operativos Windows permite a atacantes remotos ejecutar código arbitrario mediante una página web maliciosao un correo electrónico HTML que usa un valor de índice de array largo que permite un ataque de desbordamiento de búfer basado en el montón (heap). • http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0139.html http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=26 http://marc.info/?l=bugtraq&m=104812108307645&w=2 http://www.securityfocus.com/bid/7146 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-008 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A134 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A200 https:/ •

CVSS: 7.5EPSS: 97%CPEs: 8EXPL: 10

Buffer overflow in ntdll.dll on Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute arbitrary code, as demonstrated via a WebDAV request to IIS 5.0. • https://www.exploit-db.com/exploits/1 https://www.exploit-db.com/exploits/22365 https://www.exploit-db.com/exploits/22366 https://www.exploit-db.com/exploits/22367 https://www.exploit-db.com/exploits/22368 https://www.exploit-db.com/exploits/16470 https://www.exploit-db.com/exploits/2 https://www.exploit-db.com/exploits/51 https://www.exploit-db.com/exploits/36 http://marc.info/?l=bugtraq&m=104826476427372&w=2 http://marc.info/?l=bugtraq&m=104861 •

CVSS: 7.5EPSS: 2%CPEs: 45EXPL: 2

Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information. Desbordamiento de búfer en el servicio Localizador de Windows NT 4.0, Windows NT 4.0 Terminal server Edition, Windows 2000, y Windows XP permite a usuarios locales ejecutar código arbitrario mediante una llamada RPC al servicio conteniendo cierta información de parámetros. • https://www.exploit-db.com/exploits/5 https://www.exploit-db.com/exploits/22194 http://marc.info/?l=bugtraq&m=104394414713415&w=2 http://marc.info/?l=ntbugtraq&m=104393588232166&w=2 http://www.cert.org/advisories/CA-2003-03.html http://www.kb.cert.org/vuls/id/610986 http://www.securityfocus.com/bid/6666 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-001 https://exchange.xforce.ibmcloud.com/vulnerabilities/11132 https://oval.cisecurit •