Page 131 of 840 results (0.017 seconds)

CVSS: 10.0EPSS: 96%CPEs: 4EXPL: 1

The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object. El control ActiveX WebBrowser, o el motor de render HTML de Internet Explorer (MSHTML), usado en Internet Explorer 6, permite a atacantes remotos ejecutar código arbitrario en el contexto de seguridad local usando el método showModalDialog y modificando la localizacion para ejecutar código como JavaScript, como demostró usando (1) redirecciones HTTP diferidas, y una respuesta HTTP con una cabecera "Location:" conteniendo un "URL:" añadida al principio de una URI "ms-its", o (2) modificando el atributo de localización de la ventana, explotado por el gusano Ject / Scob / Toofer, usando el objeto ADODB.Stream • https://www.exploit-db.com/exploits/316 http://62.131.86.111/analysis.htm http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0031.html http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0104.html http://marc.info/?l=bugtraq&m=108786396622284&w=2 http://marc.info/?l=bugtraq&m=108852642021426&w=2 http://umbrella.name/originalvuln/msie/InsiderPrototype http://www.kb.cert.org/vuls/id/713878 http://www.us-cert.gov/cas/techalerts/TA04-163A.html http:&# •

CVSS: 5.0EPSS: 4%CPEs: 32EXPL: 2

Unknown versions of Internet Explorer and Outlook allow remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack. Versiones desconocidas de Internet Explorer y Outlook permiten a atacantes remotos suplantar URL legítimas en la barra de estado mediante etiquetas A HREF con valores "alt" modificados que apuntan al sitio legítimo, combinado con un mapa de imagen cuyo HREF apunta al sitio malicioso, lo que facilita ataques de suplantación para robo de datos (phising). • https://www.exploit-db.com/exploits/24102 http://archives.neohapsis.com/archives/bugtraq/2004-05/0161.html http://marc.info/?l=bugtraq&m=108422905510713&w=2 http://www.kurczaba.com/securityadvisories/0405132poc.htm http://www.securityfocus.com/bid/10308 https://exchange.xforce.ibmcloud.com/vulnerabilities/16102 •

CVSS: 7.5EPSS: 51%CPEs: 7EXPL: 3

Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475. Internet Explorer 5.x y 6.0 permite a atacantes remotos ejecutar programas arbitrarios mediante una URL conteniendo secuencias ".." (punto punto) en un nombre de fichero terminado en "::" que es tratado como un fichero CHM aunque no tenga extensión .chm. • https://www.exploit-db.com/exploits/23504 http://www.kb.cert.org/vuls/id/187196 http://www.securityfocus.com/archive/1/348521 http://www.securityfocus.com/bid/9320 http://www.us-cert.gov/cas/techalerts/TA04-196A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-023 https://exchange.xforce.ibmcloud.com/vulnerabilities/14105 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1186 https://oval.cisecurity.org/repository& •

CVSS: 2.6EPSS: 4%CPEs: 1EXPL: 1

mshtml.dll in Microsoft Internet Explorer 6.0.2800 allows remote attackers to cause a denial of service (crash) via a table containing a form that crosses multiple td elements, and whose "float: left" class is defined in a link to a CSS stylesheet after the end of the table, which may trigger a null dereference. Vulnerabilidad desconocida en mshtml.dll en Microsoft Internet Explorer permite a usuarios remotos causar una denegación de servicio (caída) mediante cierto documento HTML que enlaza a un documenteo CSS mediante un descriptor de clase "float:left" para un elemento de formulario, lo que puede disparar una desreferencia nula. • https://www.exploit-db.com/exploits/365 http://marc.info/?l=bugtraq&m=108490218632590&w=2 http://www.securityfocus.com/bid/10382 https://exchange.xforce.ibmcloud.com/vulnerabilities/16189 •

CVSS: 10.0EPSS: 96%CPEs: 3EXPL: 2

The Windows Shell application in Windows 98, Windows ME, Windows NT 4.0, Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by spoofing the type of a file via a CLSID specifier in the filename, as demonstrated using Internet Explorer 6.0.2800.1106 on Windows XP. Internet Explorer 6.0.2800.1106 sobre Windows XP y posiblemente otras versiones, permite a atacantes remotos suplantar el tipo de un de un fichero mediante un especificador CLSID en el nombre del fichero. • http://secunia.com/advisories/10736 http://www.kb.cert.org/vuls/id/106324 http://www.security-express.com/archives/bugtraq/2004-01/0300.html http://www.securityfocus.com/archive/1/351379 http://www.securityfocus.com/bid/9510 http://www.us-cert.gov/cas/techalerts/TA04-196A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-024 https://exchange.xforce.ibmcloud.com/vulnerabilities/14964 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg •