CVE-2002-1338
https://notcve.org/view.php?id=CVE-2002-1338
The Load method in the Chart component of Office Web Components (OWC) 9 and 10 generates an exception when a specified file does not exist, which allows remote attackers to determine the existence of local files. El método de carga en el componente Gráfica (Chart) de Office Web Components (OWC) 9 y 10 genera un excecpción cuando un fichero especificado no existe, lo que permite a atacantes remotos determinar la existencia de ficheros locales. • http://marc.info/?l=bugtraq&m=101830175621193&w=2 http://security.greymagic.com/adv/gm008-ie http://www.kb.cert.org/vuls/id/156123 http://www.securityfocus.com/bid/4454 https://exchange.xforce.ibmcloud.com/vulnerabilities/8784 •
CVE-2002-1339
https://notcve.org/view.php?id=CVE-2002-1339
The "XMLURL" property in the Spreadsheet component of Office Web Components (OWC) 10 follows redirections, which allows remote attackers to determine the existence of local files based on exceptions, or to read WorkSheet XML files. La propiedad "XMLURL" en el componente Hoja de Cálculo (Spreadsheet) de Office Web Components (OWC) 10 sigue redirecciones, lo que permite a atacantes remotos determinar la existencia de ficheros locales basado en excepciones, o leer ficheros XML Hoja de Trabajo (WorkSheet). • http://marc.info/?l=bugtraq&m=101830175621193&w=2 http://security.greymagic.com/adv/gm008-ie •
CVE-2002-1340
https://notcve.org/view.php?id=CVE-2002-1340
The "ConnectionFile" property in the DataSourceControl component in Office Web Components (OWC) 10 allows remote attackers to determine the existence of local files by detecting an exception. La propiedad "ConnectionFile" en el componente DataSourceControl en Office Web Components (OWC) 10 permite a atacantes remotos determinar la existencia de ficheros locales detectando excepciones. • http://marc.info/?l=bugtraq&m=101830175621193&w=2 http://security.greymagic.com/adv/gm008-ie •
CVE-2002-0727
https://notcve.org/view.php?id=CVE-2002-0727
The Host function in Microsoft Office Web Components (OWC) 2000 and 2002 is exposed in components that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via the setTimeout method. La función de Host en Microsoft Office Web Componentes (OWC) 2000 y 2002 está expuesta en componentes marcados como seguros para secuencias de comandos (scripting), lo que permite a atacantes ejecutar comandos arbitrarios mediante el método setTimeout. • http://marc.info/?l=bugtraq&m=101829645415486&w=2 http://www.iss.net/security_center/static/8777.php http://www.osvdb.org/3006 http://www.securityfocus.com/bid/4449 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-044 •
CVE-2002-0860
https://notcve.org/view.php?id=CVE-2002-0860
The LoadText method in the spreadsheet component in Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to read arbitrary files through Internet Explorer via a URL that redirects to the target file. El método LoadText en el componente de hoja de cálculo de Microsoft Office Web Componentes (OWC) 2000 y 2002 permite a atantes remotos leer ficheros arbitrarios con Internet Explorer mediante una URL que redirige al fichero objetivo. • http://marc.info/?l=bugtraq&m=101829911018463&w=2 http://www.iss.net/security_center/static/8778.php http://www.osvdb.org/3007 http://www.securityfocus.com/bid/4453 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-044 •