CVE-2006-6579
https://notcve.org/view.php?id=CVE-2006-6579
Microsoft Windows XP has weak permissions (FILE_WRITE_DATA and FILE_READ_DATA for Everyone) for %WINDIR%\pchealth\ERRORREP\QHEADLES, which allows local users to write and read files in this folder, as demonstrated by an ASP shell that has write access by IWAM_machine and read access by IUSR_Machine. Microsoft Windows XP tiene pérmisos débiles (FILE_WRITE_DATA y FILE_READ_DATA para cualquiera) para %WINDIR%\pchealth\ERRORREP\QHEADLES, lo cual permite a un usuario local escribir y leer archivos en esta carpeta, como se demostró con un shell ASP que tiene permisos de escritura por IWAM_machine y permiso de lectura por IUSR_Machine. • http://www.securityfocus.com/archive/1/454268/100/0/threaded •
CVE-2006-5745 – Microsoft Internet Explorer - XML Core Services HTTP Request Handling (MS06-071)
https://notcve.org/view.php?id=CVE-2006-5745
Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information. Vulnerabilidad no especificada en el método setRequestHeader en el control ActiveX XMLHTTP (XML HTTP) 4.0 en Microsoft (XML Core Services 4.0 en Windows, cuando es accedido por Internet Explorer, permite a atacantes remotos ejecutar código de su elección mediante argumentos manipulados que llevan a una corrupción de memoria, una vulnerabilidad distinta de CVE-2006-4685. NOTA: algunos de estos detalles se han obtenido de información de terceros. • https://www.exploit-db.com/exploits/16532 https://www.exploit-db.com/exploits/2743 https://www.exploit-db.com/exploits/2749 https://www.exploit-db.com/exploits/2753 http://blogs.securiteam.com/?p=717 http://secunia.com/advisories/22687 http://securitytracker.com/id?1017157 http://www.iss.net/threats/239.html http://www.kb.cert.org/vuls/id/585137 http://www.microsoft.com/technet/security/advisory/927892.mspx http://www.securityfocus.com/bid/20915 http:/ •
CVE-2006-4685
https://notcve.org/view.php?id=CVE-2006-4685
The XMLHTTP ActiveX control in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 does not properly handle HTTP server-side redirects, which allows remote user-assisted attackers to access content from other domains. El control ActiveX XMLHTTP en Microsoft XML Parser 2.6 y XML Core Services 3.0 hasta 6.0 no maneja adecuadamente redirecciones HTTP del lado del servidor, lo cual permite a atacantes remotos con la complicidad del usuario acceder a contenido desde otros dominios. • http://secunia.com/advisories/22333 http://securitytracker.com/id?1017033 http://www.kb.cert.org/vuls/id/547212 http://www.osvdb.org/29425 http://www.securityfocus.com/archive/1/449179/100/0/threaded http://www.securityfocus.com/bid/20339 http://www.vupen.com/english/advisories/2006/3980 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-061 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A221 •
CVE-2006-4686
https://notcve.org/view.php?id=CVE-2006-4686
Buffer overflow in the Extensible Stylesheet Language Transformations (XSLT) processing in Microsoft XML Parser 2.6 and XML Core Services 3.0 through 6.0 allows remote attackers to execute arbitrary code via a crafted Web page. Desbordamiento de búfer en el procesamiento de las Transformaciones de Lenguaje de Hojas de Estilo Extensibles (XSLT) en Microsoft XML Parser 2.6 y XML Core Services 3.0 hasta 6.0 permite a atacantes remotos ejecutar código de su elección mediante una página Web artesanal. • http://secunia.com/advisories/22333 http://securitytracker.com/id?1017033 http://www.kb.cert.org/vuls/id/562788 http://www.osvdb.org/29426 http://www.securityfocus.com/archive/1/449179/100/0/threaded http://www.securityfocus.com/bid/20338 http://www.vupen.com/english/advisories/2006/3980 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-061 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A285 •
CVE-2006-0026 – Microsoft IIS - ASP Stack Overflow (MS06-034)
https://notcve.org/view.php?id=CVE-2006-0026
Buffer overflow in Microsoft Internet Information Services (IIS) 5.0, 5.1, and 6.0 allows local and possibly remote attackers to execute arbitrary code via crafted Active Server Pages (ASP). Desbordamiento de búfer en Microsoft Internet Information Services (IIS) 5.0, 5.1, y 6.0 permite localmente y posiblemente a atacantes remotos ejecutar código de su elección a través de Active Server Pages (ASP) manipuladas. • https://www.exploit-db.com/exploits/2056 http://archives.neohapsis.com/archives/bugtraq/2006-07/0316.html http://secunia.com/advisories/21006 http://securitytracker.com/id?1016466 http://www.kb.cert.org/vuls/id/395588 http://www.osvdb.org/27152 http://www.securityfocus.com/bid/18858 http://www.us-cert.gov/cas/techalerts/TA06-192A.html http://www.vupen.com/english/advisories/2006/2752 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-034 •