Page 13 of 68 results (0.004 seconds)

CVSS: 4.0EPSS: 0%CPEs: 7EXPL: 0

The Remote UI in Canon imageRUNNER includes usernames and passwords when exporting an address book, which allows context-dependent attackers to obtain sensitive information. El interfaz de usuario remoto de Canon imageRUNNER incluye nombres de usuario y contraseñas cuando se exportan una libreta de direcciones, lo que permite a un atacante dependiente del contexto obtener información sensible. • http://secunia.com/advisories/21788 http://securityreason.com/securityalert/1538 http://www.securityfocus.com/archive/1/445302/100/0/threaded http://www.securityfocus.com/archive/1/445532/100/0/threaded http://www.securityfocus.com/bid/19865 http://www.vupen.com/english/advisories/2006/3501 https://exchange.xforce.ibmcloud.com/vulnerabilities/28795 •

CVSS: 5.0EPSS: 87%CPEs: 21EXPL: 3

Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by setting the Filter property of an ADODB.Recordset ActiveX object to certain values multiple times, which triggers a null dereference. Vulnerabilidad en el navegador web Internet Explorer v6 de Microsoft que permite a atacantes remotos causar una denegación de servicio (indisponibilidad de la aplicación) asignando a la propiedad "Filter" (filtro) de un objeto ActiveX ADODB.Recordset ciertos valores varias veces, lo que dispara un de-referenciación de un dirección (o puntero) nula. • https://www.exploit-db.com/exploits/28145 http://browserfun.blogspot.com/2006/07/mobb-1-adodbrecordset-filter-property.html http://www.osvdb.org/26834 http://www.securityfocus.com/bid/18773 https://exchange.xforce.ibmcloud.com/vulnerabilities/27596 •

CVSS: 4.0EPSS: 89%CPEs: 11EXPL: 0

Internet Explorer 6 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form. • http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046610.html http://secunia.com/advisories/20449 http://securityreason.com/securityalert/1059 http://www.securityfocus.com/bid/18308 http://www.vupen.com/english/advisories/2006/2161 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 2.6EPSS: 94%CPEs: 9EXPL: 1

Microsoft Internet Explorer 5.01 through 6 allows remote attackers to conduct phishing attacks by spoofing the address bar and other parts of the trust UI via unknown methods that allow "window content to persist" after the user has navigated to another site, aka the "Address Bar Spoofing Vulnerability." NOTE: this is a different vulnerability than CVE-2006-1626. • https://www.exploit-db.com/exploits/1838 http://secunia.com/advisories/18957 http://securityreason.com/securityalert/670 http://securitytracker.com/id?1015899 http://www.securityfocus.com/bid/17460 http://www.vupen.com/english/advisories/2006/1318 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 https://exchange.xforce.ibmcloud.com/vulnerabilities/25557 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1336 https://oval.ci • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 94%CPEs: 9EXPL: 1

Unspecified vulnerability in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via certain invalid HTML that causes memory corruption. • https://www.exploit-db.com/exploits/1838 http://secunia.com/advisories/18957 http://securitytracker.com/id?1015900 http://www.kb.cert.org/vuls/id/503124 http://www.securityfocus.com/bid/17450 http://www.us-cert.gov/cas/techalerts/TA06-101A.html http://www.vupen.com/english/advisories/2006/1318 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013 https://exchange.xforce.ibmcloud.com/vulnerabilities/25542 https://oval.cisecurity.org/repository/search& •