[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251782

 
 

909

 
 

196543

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.mitre.oval:def:194
Buffer overflow in a certain DCOM interface for RPC in Microsoft Windows NT 4.0, 2000, XP, and Server 2003 allows remote attackers to execute arbitrary code via a malformed message, as exploited by the Blaster/MSblast/LovSAN and Nachi/Welchia worms.

oval:org.mitre.oval:def:61
Buffer overflow in Remote Access Service (RAS) phonebook for Windows NT 4.0, 2000, XP, and Routing and Remote Access Server (RRAS) allows local users to execute arbitrary code by modifying the rasphone.pbk file to use a long dial-up entry.

oval:org.mitre.oval:def:2265
Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.

oval:org.mitre.oval:def:2022
Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.

oval:org.mitre.oval:def:142
Buffer overflow in Windows Kernel allows local users to gain privileges by causing certain error messages to be passed to a debugger.

oval:org.mitre.oval:def:103
Buffer overflow in the RPC Locator service for Microsoft Windows NT 4.0, Windows NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows local users to execute arbitrary code via an RPC call to the service containing certain parameter information.

oval:org.mitre.oval:def:146
Buffer overflow in the SMB capability for Microsoft Windows XP, 2000, and NT allows remote attackers to cause a denial of service and possibly execute arbitrary code via an SMB packet that specifies a smaller buffer length than is required.

oval:org.mitre.oval:def:4372
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Associat ...

oval:org.mitre.oval:def:4831
The WINS service (wins.exe) on Microsoft Windows NT Server 4.0, Windows 2000 Server, and Windows Server 2003 allows remote attackers to write to arbitrary memory locations and possibly execute arbitrary code via a modified memory pointer in a WINS replication packet to TCP port 42, aka the "Associat ...

oval:org.mitre.oval:def:4786
The License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, aka the "Licen ...

oval:org.mitre.oval:def:644
The License Logging service for Windows NT Server, Windows 2000 Server, and Windows Server 2003 does not properly validate the length of messages, which leads to an "unchecked buffer" and allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code, aka the "Licen ...

CVE    31
CVE-2008-4609
CVE-2005-0050
CVE-2005-0045
CVE-2005-1184
...
*CPE
cpe:/o:microsoft:windows_nt:4.0:sp6a:terminal_server

© SecPod Technologies