Page 3 of 15 results (0.011 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

The "XMLURL" property in the Spreadsheet component of Office Web Components (OWC) 10 follows redirections, which allows remote attackers to determine the existence of local files based on exceptions, or to read WorkSheet XML files. La propiedad "XMLURL" en el componente Hoja de Cálculo (Spreadsheet) de Office Web Components (OWC) 10 sigue redirecciones, lo que permite a atacantes remotos determinar la existencia de ficheros locales basado en excepciones, o leer ficheros XML Hoja de Trabajo (WorkSheet). • http://marc.info/?l=bugtraq&m=101830175621193&w=2 http://security.greymagic.com/adv/gm008-ie •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

The "ConnectionFile" property in the DataSourceControl component in Office Web Components (OWC) 10 allows remote attackers to determine the existence of local files by detecting an exception. La propiedad "ConnectionFile" en el componente DataSourceControl en Office Web Components (OWC) 10 permite a atacantes remotos determinar la existencia de ficheros locales detectando excepciones. • http://marc.info/?l=bugtraq&m=101830175621193&w=2 http://security.greymagic.com/adv/gm008-ie •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

The Host function in Microsoft Office Web Components (OWC) 2000 and 2002 is exposed in components that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via the setTimeout method. La función de Host en Microsoft Office Web Componentes (OWC) 2000 y 2002 está expuesta en componentes marcados como seguros para secuencias de comandos (scripting), lo que permite a atacantes ejecutar comandos arbitrarios mediante el método setTimeout. • http://marc.info/?l=bugtraq&m=101829645415486&w=2 http://www.iss.net/security_center/static/8777.php http://www.osvdb.org/3006 http://www.securityfocus.com/bid/4449 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-044 •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

The LoadText method in the spreadsheet component in Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to read arbitrary files through Internet Explorer via a URL that redirects to the target file. El método LoadText en el componente de hoja de cálculo de Microsoft Office Web Componentes (OWC) 2000 y 2002 permite a atantes remotos leer ficheros arbitrarios con Internet Explorer mediante una URL que redirige al fichero objetivo. • http://marc.info/?l=bugtraq&m=101829911018463&w=2 http://www.iss.net/security_center/static/8778.php http://www.osvdb.org/3007 http://www.securityfocus.com/bid/4453 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-044 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to bypass the "Allow paste operations via script" setting, even when it is disabled, via the (1) Copy method of the Cell object or (2) the Paste method of the Range object. Microsoft Office Web Components (OWC) 2000 y 2002 permite a atacantes remotos sortear la configuración de "Permitir pegar mediante script", incluso cuando está desactivada, mediante: el método Copy del objeto Cell (celda) el método Paste (pegar) del objeto Range (rango) • http://marc.info/?l=bugtraq&m=101829726516346&w=2 http://www.iss.net/security_center/static/8779.php http://www.securityfocus.com/bid/4457 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-044 •