4 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

Microsoft Malware Protection Engine before 1.1.6603.0, as used in Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, and Windows Live OneCare, allows local users to gain privileges via a crafted value of an unspecified user registry key. Microsoft Malware Protection Engine anterior a v1.1.6603.0, tal como se utilizó en Microsoft Malicious Software Removal Tool (MSRT), Windows Defender, Security Essentials, Forefront Client Security, Forefront Endpoint Protection 2010, y Windows Live OneCare, permite a usuarios locales conseguir privilegios a través de un valor manipulado de una clave de registro de usuario sin especificar • http://secunia.com/advisories/43468 http://securitytracker.com/id?1025117 http://www.microsoft.com/technet/security/advisory/2491888.mspx http://www.securityfocus.com/bid/46540 http://www.vupen.com/english/advisories/2011/0486 https://exchange.xforce.ibmcloud.com/vulnerabilities/65626 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 8%CPEs: 10EXPL: 0

Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (disk space exhaustion) via a file with "crafted data structures" that trigger the creation of large temporary files, a different vulnerability than CVE-2008-1437. Vulnerabilidad no especificada en la Máquina de Protección de Malware de Microsoft (mpengine.dll) versiones 1.1.3520.0 y 0.1.13.192, tal y como se usa en múltiples productos de Microsoft, permite a atacantes según contexto provocar una denegación de Servicio (agotamiento de espacio en disco) a través de “estructuras de datos manipuladas” que provocan la creación de ficheros grandes temporales, una vulnerabilidad diferente a la CVE-2008-1438. • http://marc.info/?l=bugtraq&m=121129490723574&w=2 http://secunia.com/advisories/30172 http://www.securityfocus.com/bid/29073 http://www.securitytracker.com/id?1020016 http://www.us-cert.gov/cas/techalerts/TA08-134A.html http://www.vupen.com/english/advisories/2008/1506/references https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14375 • CWE-399: Resource Management Errors •

CVSS: 5.0EPSS: 69%CPEs: 10EXPL: 0

Unspecified vulnerability in Microsoft Malware Protection Engine (mpengine.dll) 1.1.3520.0 and 0.1.13.192, as used in multiple Microsoft products, allows context-dependent attackers to cause a denial of service (engine hang and restart) via a crafted file, a different vulnerability than CVE-2008-1438. Vulnerabilidad no especificada en la Máquina de Protección de Malware de Microsoft (mpengine.dll) versiones 1.1.3520.0 y 0.1.13.192, tal y como se usa en múltiples productos de Microsoft, permite a atacantes según contexto provocar una denegación de servicio (cuelgue del equipo y reinicio) a través de un archivo manipulado, una vulnerabilidad diferente a la CVE-2008-1438. • http://marc.info/?l=bugtraq&m=121129490723574&w=2 http://secunia.com/advisories/30172 http://www.securityfocus.com/bid/29060 http://www.securitytracker.com/id?1020016 http://www.us-cert.gov/cas/techalerts/TA08-134A.html http://www.vupen.com/english/advisories/2008/1506/references https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-029 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A13981 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 54%CPEs: 5EXPL: 0

Integer overflow in the Microsoft Malware Protection Engine (mpengine.dll), as used by Windows Live OneCare, Antigen, Defender, and Forefront Security, allows user-assisted remote attackers to execute arbitrary code via a crafted PDF file. Desbordamiento de entero en el Motor de Protección de Malware de Microsoft (mpengine.dll), como el usado en Windows Live OneCare, Antigen, Defender, y Forefront Security, permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante un fichero PDF artesanal. • http://secunia.com/advisories/24146 http://www.kb.cert.org/vuls/id/511577 http://www.osvdb.org/31888 http://www.securityfocus.com/bid/22479 http://www.securitytracker.com/id?1017636 http://www.us-cert.gov/cas/techalerts/TA07-044A.html http://www.vupen.com/english/advisories/2007/0579 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-010 •