Page 12 of 317 results (0.003 seconds)

CVSS: 5.0EPSS: 23%CPEs: 13EXPL: 1

Microsoft Internet Explorer 6.0.2900 SP2 and earlier allows remote attackers to cause a denial of service (crash) via a table element with a CSS attribute that sets the position, which triggers an "unhandled exception" in mshtml.dll. Microsoft Internet Explorer 6.0.2900 SP2 y versiones anteriores permite a atacantes remotos provocar una denegación de servicio (caída) mediante un elemento tabla con un atributo CSS que fija la posición, lo cual dispara una "excepción no manejada" en mshtml.dll. • https://www.exploit-db.com/exploits/1775 http://www.securityfocus.com/bid/17932 •

CVSS: 7.5EPSS: 0%CPEs: 18EXPL: 0

SQL injection vulnerability in directory.php in Super Link Exchange Script 1.0 might allow remote attackers to execute arbitrary SQL queries via the cat parameter. Vulnerabilidad de inyección SQL en directory.php en Super Link Exchange Script 1.0 podría permitir a atacantes remotos ejecutar consultas SQL de su elección a través del parámetro cat. • http://securityreason.com/securityalert/2285 http://www.securityfocus.com/archive/1/435166/30/4680/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/26720 •

CVSS: 5.0EPSS: 1%CPEs: 11EXPL: 0

The IMAP4 service in MERCUR Messaging 2005 before Service Pack 4 allows remote attackers to cause a denial of service (crash) via a message with a long subject field. El servicio IMAP4 en MERCUR Messaging 2005 anterior a Service Pack 4 permite a atacantes remotos provocar denegación de servicio (caida) a través de un mensaje con un campo subject. • http://secunia.com/advisories/20432 http://www.atrium-software.com/download/McrReadMe_EN.html http://www.securityfocus.com/bid/18462 http://www.vupen.com/english/advisories/2006/2354 https://exchange.xforce.ibmcloud.com/vulnerabilities/27229 •

CVSS: 4.4EPSS: 0%CPEs: 11EXPL: 0

Mathcad 12 through 13.1 allows local users to bypass the security features by directly accessing or editing the XML representation of the worksheet with a text editor or other program, which allows attackers to (1) bypass password protection by replacing the password field with a hash of a known password, (2) modify timestamps to avoid detection of modifications, (3) remove locks by removing the "is-locked" attribute, and (4) view locked data, which is stored in plaintext. Mathcad versiones 12 hasta 13.1, permite a usuarios locales omitir las funcionalidades de seguridad accediendo o editando directamente la representación XML de la hoja de trabajo con un editor de texto u otro programa, que permite a atacantes (1) omitir la protección con contraseña reemplazando el campo password con un hash de una contraseña conocida, (2) modificar las marcas de tiempo para evitar la detección de modificaciones, (3) eliminar bloqueos eliminando el atributo "is-locked", y (4) visualizar datos bloqueados, que se almacenan en texto plano. • http://securityreason.com/securityalert/2305 http://www.securityfocus.com/archive/1/436441/30/4560/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/27115 https://exchange.xforce.ibmcloud.com/vulnerabilities/27116 https://exchange.xforce.ibmcloud.com/vulnerabilities/27117 https://exchange.xforce.ibmcloud.com/vulnerabilities/27118 •

CVSS: 7.5EPSS: 4%CPEs: 18EXPL: 2

Ezboo webstats, possibly 3.0.3, allows remote attackers to bypass authentication and gain access via a direct request to (1) update.php and (2) config.php. Ezboo webstats, posiblemente la 3.0.3, permite a atacantes remotos evitar la autenticación y obtener una vía de acceso mediante una petición directa al (1) update.php y (2) config.php. • https://www.exploit-db.com/exploits/29610 http://forums.avenir-geopolitique.net/viewtopic.php?t=2674 http://osvdb.org/34181 http://securityreason.com/securityalert/2275 http://www.securityfocus.com/archive/1/460325/100/0/threaded http://www.securityfocus.com/bid/22590 https://exchange.xforce.ibmcloud.com/vulnerabilities/32563 •