Show filters
298 Total Results
Displaying 201-210 of 298
Sort by:
Attacker Value
Unknown

CVE-2006-1184

Disclosure Date: May 10, 2006 (last updated October 04, 2023)
Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0, 2000 SP4, XP SP1 and SP2, and Server 2003 allows remote attackers to cause a denial of service (crash) via a BuildContextW request with a large (1) UuidString or (2) GuidIn of a certain length, which causes an out-of-range memory access, aka the MSDTC Denial of Service Vulnerability. NOTE: this is a variant of CVE-2005-2119.
0
Attacker Value
Unknown

CVE-2006-0034

Disclosure Date: May 10, 2006 (last updated October 04, 2023)
Heap-based buffer overflow in the CRpcIoManagerServer::BuildContext function in msdtcprx.dll for Microsoft Distributed Transaction Coordinator (MSDTC) for Windows NT 4.0 and Windows 2000 SP2 and SP3 allows remote attackers to execute arbitrary code via a long fifth argument to the BuildContextW or BuildContext opcode, which triggers a bug in the NdrAllocate function, aka the MSDTC Invalid Memory Access Vulnerability.
0
Attacker Value
Unknown

CVE-2006-0012

Disclosure Date: April 12, 2006 (last updated October 04, 2023)
Unspecified vulnerability in Windows Explorer in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 SP1 allows remote attackers to execute arbitrary code via attack vectors involving COM objects and "crafted files and directories," aka the "Windows Shell Vulnerability."
0
Attacker Value
Unknown

CVE-2006-1591

Disclosure Date: April 03, 2006 (last updated February 22, 2025)
Heap-based buffer overflow in Microsoft Windows Help winhlp32.exe allows user-assisted attackers to execute arbitrary code via crafted embedded image data in a .hlp file.
0
Attacker Value
Unknown

CVE-2006-0988

Disclosure Date: March 03, 2006 (last updated February 22, 2025)
The default configuration of the DNS Server service on Windows Server 2003 and Windows 2000, and the Microsoft DNS Server service on Windows NT 4.0, allows recursive queries and provides additional delegation information to arbitrary IP addresses, which allows remote attackers to cause a denial of service (traffic amplification) via DNS queries with spoofed source IP addresses.
0
Attacker Value
Unknown

CVE-2006-0006

Disclosure Date: February 14, 2006 (last updated February 22, 2025)
Heap-based buffer overflow in the bitmap processing routine in Microsoft Windows Media Player 7.1 on Windows 2000 SP4, Media Player 9 on Windows 2000 SP4 and XP SP1, and Media Player 10 on XP SP1 and SP2 allows remote attackers to execute arbitrary code via a crafted bitmap (.BMP) file that specifies a size of 0 but contains additional data.
0
Attacker Value
Unknown

CVE-2006-0005

Disclosure Date: February 14, 2006 (last updated February 22, 2025)
Buffer overflow in the plug-in for Microsoft Windows Media Player (WMP) 9 and 10, when used in browsers other than Internet Explorer and set as the default application to handle media files, allows remote attackers to execute arbitrary code via HTML with an EMBED element containing a long src attribute.
0
Attacker Value
Unknown

CVE-2006-0488

Disclosure Date: February 01, 2006 (last updated February 22, 2025)
The VDM (Virtual DOS Machine) emulation environment for MS-DOS applications in Windows 2000, Windows XP SP2, and Windows Server 2003 allows local users to read the first megabyte of memory and possibly obtain sensitive information, as demonstrated by dumper.asm.
0
Attacker Value
Unknown

CVE-2006-0376

Disclosure Date: January 22, 2006 (last updated February 22, 2025)
The 802.11 wireless client in certain operating systems including Windows 2000, Windows XP, and Windows Server 2003 does not warn the user when (1) it establishes an association with a station in ad hoc (aka peer-to-peer) mode or (2) a station in ad hoc mode establishes an association with it, which allows remote attackers to put unexpected wireless communication into place.
0
Attacker Value
Unknown

CVE-2006-0010

Disclosure Date: January 10, 2006 (last updated February 22, 2025)
Heap-based buffer overflow in T2EMBED.DLL in Microsoft Windows 2000 SP4, XP SP1 and SP2, and Server 2003 up to SP1, Windows 98, and Windows ME allows remote attackers to execute arbitrary code via an e-mail message or web page with a crafted Embedded Open Type (EOT) web font that triggers the overflow during decompression.
0