Page 3 of 15 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

The "XMLURL" property in the Spreadsheet component of Office Web Components (OWC) 10 follows redirections, which allows remote attackers to determine the existence of local files based on exceptions, or to read WorkSheet XML files. La propiedad "XMLURL" en el componente Hoja de Cálculo (Spreadsheet) de Office Web Components (OWC) 10 sigue redirecciones, lo que permite a atacantes remotos determinar la existencia de ficheros locales basado en excepciones, o leer ficheros XML Hoja de Trabajo (WorkSheet). • http://marc.info/?l=bugtraq&m=101830175621193&w=2 http://security.greymagic.com/adv/gm008-ie •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 1

The Load method in the Chart component of Office Web Components (OWC) 9 and 10 generates an exception when a specified file does not exist, which allows remote attackers to determine the existence of local files. El método de carga en el componente Gráfica (Chart) de Office Web Components (OWC) 9 y 10 genera un excecpción cuando un fichero especificado no existe, lo que permite a atacantes remotos determinar la existencia de ficheros locales. • http://marc.info/?l=bugtraq&m=101830175621193&w=2 http://security.greymagic.com/adv/gm008-ie http://www.kb.cert.org/vuls/id/156123 http://www.securityfocus.com/bid/4454 https://exchange.xforce.ibmcloud.com/vulnerabilities/8784 •

CVSS: 5.0EPSS: 2%CPEs: 4EXPL: 0

The LoadText method in the spreadsheet component in Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to read arbitrary files through Internet Explorer via a URL that redirects to the target file. El método LoadText en el componente de hoja de cálculo de Microsoft Office Web Componentes (OWC) 2000 y 2002 permite a atantes remotos leer ficheros arbitrarios con Internet Explorer mediante una URL que redirige al fichero objetivo. • http://marc.info/?l=bugtraq&m=101829911018463&w=2 http://www.iss.net/security_center/static/8778.php http://www.osvdb.org/3007 http://www.securityfocus.com/bid/4453 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-044 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

The Host function in Microsoft Office Web Components (OWC) 2000 and 2002 is exposed in components that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via the setTimeout method. La función de Host en Microsoft Office Web Componentes (OWC) 2000 y 2002 está expuesta en componentes marcados como seguros para secuencias de comandos (scripting), lo que permite a atacantes ejecutar comandos arbitrarios mediante el método setTimeout. • http://marc.info/?l=bugtraq&m=101829645415486&w=2 http://www.iss.net/security_center/static/8777.php http://www.osvdb.org/3006 http://www.securityfocus.com/bid/4449 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-044 •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Microsoft Office Web Components (OWC) 2000 and 2002 allows remote attackers to bypass the "Allow paste operations via script" setting, even when it is disabled, via the (1) Copy method of the Cell object or (2) the Paste method of the Range object. Microsoft Office Web Components (OWC) 2000 y 2002 permite a atacantes remotos sortear la configuración de "Permitir pegar mediante script", incluso cuando está desactivada, mediante: el método Copy del objeto Cell (celda) el método Paste (pegar) del objeto Range (rango) • http://marc.info/?l=bugtraq&m=101829726516346&w=2 http://www.iss.net/security_center/static/8779.php http://www.securityfocus.com/bid/4457 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-044 •