3 results (0.011 seconds)

CVSS: 9.3EPSS: 43%CPEs: 13EXPL: 0

Heap-based buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2006 SP1, and Office Small Business Accounting 2006 allows remote attackers to execute arbitrary code via unspecified parameters to unknown methods, aka "Office Web Components Heap Corruption Vulnerability." Desbordamiento de búfer basado en memoria dinámica (heap) en el Componentes Office Web ActiveX Control en Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 para el 2007 Microsoft Office System, Internet Security y Acceleration (ISA) Server 2004 SP3 y 2006 SP1, y Office Small Business Accounting 2006 permite a los atacantes remotos ejecutar arbitrariamente código a través de parámetros no especificados a métodos desconocidos, también conocidos como "Vulnerabilidad de corrupción de memoria dinámica en componentes de Office Web". This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific vulnerability exists in the OWC10.Spreadsheet.10 ActiveX control installed by Microsoft Office. By accessing specific methods in a certain order heap corruption occurs leading to remote code execution. • http://www.securitytracker.com/id?1022708 http://www.us-cert.gov/cas/techalerts/TA09-223A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-043 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5645 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 95%CPEs: 5EXPL: 0

The firewall engine in Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); and Internet Security and Acceleration (ISA) Server 2004 SP3, 2006, 2006 Supportability Update, and 2006 SP1; does not properly manage the session state of web listeners, which allows remote attackers to cause a denial of service (many stale sessions) via crafted packets, aka "Web Proxy TCP State Limited Denial of Service Vulnerability." El motor del cortafuegos en Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); e Internet Security and Acceleration (ISA) Server 2004 SP3, 2006, 2006 Supportability Update, y 2006 SP1; no gestiona adecuadamente el estado de sesión de los oyentes web, lo que permite a atacantes remotos provocar una denegación de servicio (muchas sesiones caducadas)a través de paquetes manipulados, también conocido como "Vulnerabilidad de denegación de servicio de limitada por el estado TCP del Web Proxy". • http://osvdb.org/53636 http://secunia.com/advisories/34687 http://www.securitytracker.com/id?1022045 http://www.us-cert.gov/cas/techalerts/TA09-104A.html http://www.vupen.com/english/advisories/2009/1030 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6068 •

CVSS: 4.3EPSS: 91%CPEs: 5EXPL: 0

Cross-site scripting (XSS) vulnerability in cookieauth.dll in the HTML forms authentication component in Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); and Internet Security and Acceleration (ISA) Server 2006, 2006 Supportability Update, and 2006 SP1; allows remote attackers to inject arbitrary web script or HTML via "authentication input" to this component, aka "Cross-Site Scripting Vulnerability." Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en cookieauth.dll en el componente HTML forms authentication en Microsoft Forefront Threat Management Gateway, Medium Business Edition (TMG MBE); e Internet Security and Acceleration (ISA) Server 2006, 2006 Supportability Update, y 2006 SP1; permite a atacantes remotos inyectar código web script o HTML de su elección a través de "entrada de autenticación" a este componente, también conocido como "Vulnerabilidad de secuencias de comandos en sitios cruzados". • http://osvdb.org/53637 http://secunia.com/advisories/34687 http://www.securitytracker.com/id?1022046 http://www.us-cert.gov/cas/techalerts/TA09-104A.html http://www.vupen.com/english/advisories/2009/1030 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5771 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •