Filter
AND

Versions

Microsoft Windows XPBuffer Overflow

First published (updated )

Microsoft Windows NTA system does not present an appropriate legal message or warning to a user who is accessing it.

First published (updated )

Microsoft Internet ExplorerBuffer Overflow, Double Free

First published (updated )

Microsoft Windows 2003 ServerBuffer Overflow, Integer Overflow

First published (updated )

Microsoft Windows NTMicrosoft Virtual Machine (VM) up to and including build 5.0.3805 allows remote attackers to execute…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTMicrosoft Word for Windows 6.0 Converter (MSWRD632.WPC), as used in WordPad, does not properly valid…

First published (updated )

Microsoft Windows NTMicrosoft Word for Windows 6.0 Converter does not properly validate certain data lengths, which allo…

First published (updated )

Microsoft Internet ExplorerBuffer Overflow

First published (updated )

Microsoft Windows NTBuffer Overflow

First published (updated )

Achievo AchievoPHP remote file inclusion vulnerability in index.php in Achievo 1.1.0 allows remote attackers to exe…

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTThe default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and X…

First published (updated )

Microsoft Windows XPInteger Overflow

First published (updated )

Microsoft Windows Media PlayerBuffer Overflow

First published (updated )

Microsoft Windows NTBuffer Overflow

First published (updated )

Quinnware Quintessential PlayerBuffer Overflow

First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows NTWindows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote att…

7.8
First published (updated )

Microsoft Windows NTInput Validation

7.8
First published (updated )

Microsoft Windows 95A legacy credential caching mechanism used in Windows 95 and Windows 98 systems allows attackers to …

7.8
First published (updated )

Epson PrintUntrusted search path vulnerability in the installers of multiple SEIKO EPSON products allows an att…

7.8
First published (updated )

Microsoft Windows 95The networking software in Windows 95 and Windows 98 allows remote attackers to execute commands via…

7.6
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows 2000Windows Internet Naming Service (WINS) allows remote attackers to cause a denial of service (connect…

7.6
First published (updated )

Microsoft Windows NTBuffer Overflow

7.6
First published (updated )

Mplayer MplayerBuffer Overflow

7.6
First published (updated )

Microsoft Windows XPThe document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP,…

7.5
First published (updated )

Microsoft Windows XPInput Validation

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Microsoft Windows XPBuffer Overflow

7.5
First published (updated )

Microsoft Windows 2000Buffer Overflow

7.5
First published (updated )

Microsoft Windows XPInternet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and dr…

7.5
First published (updated )

Microsoft Windows NTMicrosoft Data Access Component Internet Publishing Provider 8.103.2519.0 and earlier allows remote …

7.5
First published (updated )

Microsoft Windows 98SEBuffer Overflow

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203