5 results (0.013 seconds)

CVSS: 7.1EPSS: 1%CPEs: 15EXPL: 1

The Nortel UNIStim IP Softphone 2050, IP Phone 1140E, and other Nortel IP Phone, Mobile Voice Client, and WLAN Handsets products allow remote attackers to cause a denial of service (device hang) via a flood of Mute and UnMute messages that have a spoofed source IP address for the Signaling Server. El Nortel UNIStim IP Softphone 2050, IP Phone 1140E, y otros Nortel IP Phone, Mobile Voice Client, y productos WLAN Handsets permite a atacantes remotos provocar denegación de servicio (cuelgue del dispositivo) a travé sd eun flujo de mensajes Mute y UnMute que tienen una fuente de dirección IP falsa para el Signaling Server. • http://securityreason.com/securityalert/3273 http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=654715 http://www.csnc.ch/static/advisory/csnc/nortel_IP_phone_flooding_denial_of_service_v1.0.txt http://www.securityfocus.com/archive/1/482480/100/0/threaded http://www.securityfocus.com/bid/26122 https://exchange.xforce.ibmcloud.com/vulnerabilities/37253 •

CVSS: 7.5EPSS: 20%CPEs: 1EXPL: 3

Buffer overflow in the Nortel UNIStim IP Softphone 2050 allows remote attackers to cause a denial of service (application abort) and possibly execute arbitrary code via a flood of invalid characters to the RTCP port (5678/udp) that triggers a Windows error message, aka "extraneous messaging." Desbordamiento de búfer en Nortel UNIStim IP Softphone 2050 permite a atacantes remotos provocar denegación de servicio (abortar aplicación) y posiblemente ejecutar código de su elección a través de una inundación de carácteres no válidos en el puerto RTCP (5678/udp) que dispara un mensaje de error Windows, también conocido como "mensaje extraño". • https://www.exploit-db.com/exploits/30678 http://osvdb.org/38521 http://secunia.com/advisories/27252 http://securityreason.com/securityalert/3271 http://support.nortel.com/go/main.jsp?cscat=BLTNDETAIL&id=655203 http://www.csnc.ch/static/advisory/csnc/nortel_UNIStim_IP_softphone_buffer-overflow_v1.0.txt http://www.securityfocus.com/archive/1/482476/100/0/threaded http://www.securityfocus.com/bid/26118 http://www.vupen.com/english/advisories/2007/3540 https://exchange.xforce&# • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.0EPSS: 19%CPEs: 67EXPL: 1

The Windows Animated Cursor (ANI) capability in Windows NT, Windows 2000 through SP4, Windows XP through SP1, and Windows 2003 allow remote attackers to cause a denial of service via (1) the frame number set to zero, which causes an invalid memory address to be used and leads to a kernel crash, or (2) the rate number set to zero, which leads to resource exhaustion and hang. • https://www.exploit-db.com/exploits/721 http://marc.info/?l=bugtraq&m=110382854111833&w=2 http://www.kb.cert.org/vuls/id/177584 http://www.kb.cert.org/vuls/id/697136 http://www.us-cert.gov/cas/techalerts/TA05-012A.html http://www.xfocus.net/flashsky/icoExp https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-002 https://exchange.xforce.ibmcloud.com/vulnerabilities/18667 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.o •

CVSS: 5.0EPSS: 7%CPEs: 27EXPL: 2

The DHTML Edit Control (dhtmled.ocx) allows remote attackers to inject arbitrary web script into other domains by setting a name for a window, opening a child page whose target is the window with the given name, then injecting the script from the parent into the child using execScript, as demonstrated by "AbusiveParent" in Internet Explorer 6.0.2900.2180. • http://archives.neohapsis.com/archives/bugtraq/2004-12/0167.html http://freehost07.websamba.com/greyhats/abusiveparent-discussion.htm http://secunia.com/advisories/13482 http://www.kb.cert.org/vuls/id/356600 http://www.securityfocus.com/bid/11950 http://www.us-cert.gov/cas/techalerts/TA05-039A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-013 https://exchange.xforce.ibmcloud.com/vulnerabilities/18504 https://oval.cisecurity.org/repository/search/definitio •

CVSS: 5.0EPSS: 89%CPEs: 46EXPL: 1

Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html". • http://marc.info/?l=bugtraq&m=109303291513335&w=2 http://marc.info/?l=bugtraq&m=109336221826652&w=2 http://seclists.org/lists/fulldisclosure/2004/Aug/0868.html http://www.kb.cert.org/vuls/id/526089 http://www.securityfocus.com/bid/10973 http://www.us-cert.gov/cas/techalerts/TA04-293A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-038 https://exchange.xforce.ibmcloud.com/vulnerabilities/17044 https://oval.cisecurity.org/repository/search&# •