3 results (0.001 seconds)

CVSS: 10.0EPSS: 80%CPEs: 1EXPL: 0

The NSPLookupServiceNext function in the client in Microsoft Forefront Threat Management Gateway (TMG) 2010 allows remote attackers to execute arbitrary code via vectors involving unspecified requests, aka "TMG Firewall Client Memory Corruption Vulnerability." La función NSPLookupServiceNext en el cliente de Microsoft Forefront Threat Management Gateway (TMG) 2010 permite a atacantes remotos ejecutar código de su elección a través de vectores que implican peticiones no especificadas, también conocido como "Vulnerabilidad de corrupción de memoria en el cliente de Firewall TMG." A remote code execution vulnerability exists in the Forefront Threat Management Gateway (TMG) Firewall Client Winsock provider that could allow code execution in the security context of the client application. • http://secunia.com/advisories/44857 http://www.securityfocus.com/bid/48181 http://www.securitytracker.com/id?1025637 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-040 https://exchange.xforce.ibmcloud.com/vulnerabilities/67736 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12642 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 92%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in cookieauth.dll in the HTML forms authentication component in Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); and Internet Security and Acceleration (ISA) Server 2006, 2006 Supportability Update, and 2006 SP1; allows remote attackers to inject arbitrary web script or HTML via "authentication input" to this component, aka "Cross-Site Scripting Vulnerability." Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en cookieauth.dll en el componente HTML forms authentication en Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); e Internet Security and Acceleration (ISA) Server 2006, 2006 Supportability Update, y 2006 SP1; permite a atacantes remotos inyectar código web script o HTML de su elección a través de "entrada de autenticación" a este componente, también conocido como "Vulnerabilidad de secuencias de comandos en sitios cruzados". • http://osvdb.org/53637 http://secunia.com/advisories/34687 http://www.securitytracker.com/id?1022046 http://www.us-cert.gov/cas/techalerts/TA09-104A.html http://www.vupen.com/english/advisories/2009/1030 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5771 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 94%CPEs: 5EXPL: 0

The firewall engine in Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); and Internet Security and Acceleration (ISA) Server 2004 SP3, 2006, 2006 Supportability Update, and 2006 SP1; does not properly manage the session state of web listeners, which allows remote attackers to cause a denial of service (many stale sessions) via crafted packets, aka "Web Proxy TCP State Limited Denial of Service Vulnerability." El motor del cortafuegos en Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); e Internet Security and Acceleration (ISA) Server 2004 SP3, 2006, 2006 Supportability Update, y 2006 SP1; no gestiona adecuadamente el estado de sesión de los oyentes web, lo que permite a atacantes remotos provocar una denegación de servicio (muchas sesiones caducadas)a través de paquetes manipulados, también conocido como "Vulnerabilidad de denegación de servicio de limitada por el estado TCP del Web Proxy". • http://osvdb.org/53636 http://secunia.com/advisories/34687 http://www.securitytracker.com/id?1022045 http://www.us-cert.gov/cas/techalerts/TA09-104A.html http://www.vupen.com/english/advisories/2009/1030 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6068 •