CVE-2007-3893
https://notcve.org/view.php?id=CVE-2007-3893
Unspecified vulnerability in Microsoft Internet Explorer 5.01 through 7 allows remote attackers to execute arbitrary code via unspecified vectors involving memory corruption from an unhandled error. Vulnerabilidad no especificada en Microsoft Internet Explorer 5.01 hasta 7 permite a atacantes remotos ejecutar código de su elección mediante vectores no especificados que implican corrupción de memoria debido a un error no controlado. • http://secunia.com/advisories/23469 http://securitytracker.com/id?1018788 http://www.securityfocus.com/archive/1/482366/100/0/threaded http://www.securityfocus.com/bid/25916 http://www.us-cert.gov/cas/techalerts/TA07-282A.html http://www.vupen.com/english/advisories/2007/3437 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2284 • CWE-399: Resource Management Errors •
CVE-2007-4848
https://notcve.org/view.php?id=CVE-2007-4848
Microsoft Internet Explorer 4.0 through 7 allows remote attackers to determine the existence of local files that have associated images via a res:// URI in the src property of a JavaScript Image object, as demonstrated by the URI for a bitmap image resource within a (1) .exe or (2) .dll file. Microsoft Internet Explorer 4.0 hasta 7 permite a atacantes remotos determinar la existencia de archivos locales que tienen imágenes asociadas mediante un URI res:// en la propiedad src de un objeto Image de JavaScript, como se ha demostrado con el URI de un recurso de imagen bitmap dentro de un archivo (1) .exe o (2) .dll. • http://osvdb.org/37638 http://xs-sniper.com/blog/2007/07/20/more-uri-stuff-ies-resouce-uri •
CVE-2007-4790 – Microsoft Visual FoxPro 6.0 - FPOLE.OCX 6.0.8450.0 Remote (PoC)
https://notcve.org/view.php?id=CVE-2007-4790
Stack-based buffer overflow in certain ActiveX controls in (1) FPOLE.OCX 6.0.8450.0 and (2) Foxtlib.ocx, as used in the Microsoft Visual FoxPro 6.0 fpole 1.0 Type Library; and Internet Explorer 5.01, 6 SP1 and SP2, and 7; allows remote attackers to execute arbitrary code via a long first argument to the FoxDoCmd function. Desbordamiento de búfer en la región stack de la memoria en ciertos controles ActiveX en las bibliotecas (1) FPOLE. OCX versión 6.0.8450.0 y (2) Foxtlib.ocx, tal y como son usados en Microsoft Visual FoxPro versión 6.0 fpole 1.0 Type Library; e Internet Explorer versiones 5.01, 6 SP1 y SP2, y 7; permiten a atacantes remotos ejecutar código arbitrario por medio de un primer argumento largo en la función FoxDoCmd. • https://www.exploit-db.com/exploits/4369 http://marc.info/?l=bugtraq&m=120361015026386&w=2 http://www.securityfocus.com/bid/25571 http://www.securitytracker.com/id?1019378 http://www.us-cert.gov/cas/techalerts/TA08-043C.html http://www.vupen.com/english/advisories/2008/0512/references https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-010 https://exchange.xforce.ibmcloud.com/vulnerabilities/36496 https://oval.cisecurity.org/repository/search/definition/oval& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2007-1749 – Microsoft Internet Explorer 5.0.1 - Vector Markup Language 'VGX.dll' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2007-1749
Integer underflow in the CDownloadSink class code in the Vector Markup Language (VML) component (VGX.DLL), as used in Internet Explorer 5.01, 6, and 7 allows remote attackers to execute arbitrary code via compressed content with an invalid buffer size, which triggers a heap-based buffer overflow. Desbordamiento de entero en CDownloadSink class code en el componente de Lenguaje de Marcado Vectoria (VML) (VGX.DLL), como el utilizado en Internet Explorer 5.01, 6, y 7 permite a atacantes remotos ejecutar código de su elección mediante contenido comprimido con un tamaño de búfer inválido, lo cual provoca desbordamiento de búfer basado en pila. • https://www.exploit-db.com/exploits/30494 http://research.eeye.com/html/advisories/published/AD20070814a.html http://secunia.com/advisories/26409 http://securityreason.com/securityalert/3020 http://www.kb.cert.org/vuls/id/468800 http://www.securityfocus.com/archive/1/476498/100/0/threaded http://www.securityfocus.com/bid/25310 http://www.securitytracker.com/id?1018568 http://www.us-cert.gov/cas/techalerts/TA07-226A.html http://www.vupen.com/english/advisories/2007/2874 h •
CVE-2007-3041
https://notcve.org/view.php?id=CVE-2007-3041
Unspecified vulnerability in the pdwizard.ocx ActiveX object for Internet Explorer 5.01, 6 SP1, and 7 allows remote attackers to execute arbitrary code via unknown vectors related to Microsoft Visual Basic 6 objects and memory corruption, aka "ActiveX Object Memory Corruption Vulnerability." Una vulnerabilidad no especificada en el objeto ActiveX del archivo pdwizard.ocx para Internet Explorer versiones 5.01, 6 SP1 y 7, permite a atacantes remotos ejecutar código arbitrario por medio de vectores de ataque desconocidos relacionados con objetos de Microsoft Visual Basic versión 6 y una corrupción de memoria, también se conoce como "ActiveX Object Memory Corruption Vulnerability". • http://secunia.com/advisories/26419 http://securitytracker.com/id?1018562 http://www.osvdb.org/36395 http://www.securityfocus.com/bid/25295 http://www.us-cert.gov/cas/techalerts/TA07-226A.html http://www.vupen.com/english/advisories/2007/2869 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-045 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2232 •