4 results (0.009 seconds)

CVSS: 4.3EPSS: 8%CPEs: 55EXPL: 0

Unspecified vulnerability in the arclib component in the Anti-Virus engine in CA Anti-Virus for the Enterprise (formerly eTrust Antivirus) 7.1 through r8.1; Anti-Virus 2007 (v8) through 2009; eTrust EZ Antivirus r7.1; Internet Security Suite 2007 (v3) through Plus 2009; and other CA products allows remote attackers to cause a denial of service via a crafted RAR archive file that triggers stack corruption, a different vulnerability than CVE-2009-3587. Vulnerabilidad inespecífica en el componente arclib en el motor antivirus en CA Anti-Virus para empresas (anteriormente eTrust Antivirus) desde v7.1 hasta r8.1; Anti-Virus desde 2007 (v8) hasta 2009; eTrust EZ Antivirus r7.1; Internet Security Suite desde 2007 (v3) hasta Plus 2009; y otros productos de CA permite a atacantes remotos producir una denegación de servicio a través de un archivo RAR manipulado que inicia la corrupción de la pila, una vulnerabilidad diferente que CVE-2009-3587. • http://secunia.com/advisories/36976 http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=218878 http://www.securityfocus.com/archive/1/507068/100/0/threaded http://www.securityfocus.com/bid/36653 http://www.securitytracker.com/id?1022999 http://www.vupen.com/english/advisories/2009/2852 https://exchange.xforce.ibmcloud.com/vulnerabilities/53698 •

CVSS: 5.0EPSS: 67%CPEs: 8EXPL: 1

The Remote Control Client service in Microsoft's Systems Management Server (SMS) 2.50.2726.0 allows remote attackers to cause a denial of service (crash) via a data packet to TCP port 2702 that causes the server to read or write to an invalid memory address. El servicio de Cliente de Control Remoto de Microsoft's Systems Management Server (SMS) 2.50.2726.0 permite a atacantes remotos causar una denegación de servicio (caída) mediante un paquete de datos al puerto TCP 2702 que causa que el servidor lea o escriba de una dirección de memoria inválida. • https://www.exploit-db.com/exploits/366 http://marc.info/?l=bugtraq&m=108983763710315&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/16696 •

CVSS: 7.5EPSS: 43%CPEs: 6EXPL: 0

Buffer overflows in Microsoft Network Monitor (Netmon) allow remote attackers to execute arbitrary commands via a long Browser Name in a CIFS Browse Frame, a long SNMP community name, or a long username or filename in an SMB session, aka the "Netmon Protocol Parsing" vulnerability. NOTE: It is highly likely that this candidate will be split into multiple candidates. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-083 https://exchange.xforce.ibmcloud.com/vulnerabilities/5399 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

The SMS Remote Control program is installed with insecure permissions, which allows local users to gain privileges by modifying or replacing the program. • https://www.exploit-db.com/exploits/19728 http://archives.neohapsis.com/archives/ntbugtraq/current/0045.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-012 •