Page 3 of 20 results (0.008 seconds)

CVSS: 4.3EPSS: 25%CPEs: 10EXPL: 0

The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Scripting Engine Information Disclosure Vulnerability." Los motores Microsoft (1) VBScript 5.7 y 5.8 y (2) JScript 5.7 y 5.8, tal como se utiliza en Internet Explorer 8 hasta la versión 11 y otros productos, permiten a atacantes remotos obtener información sensible de los procesos de la memoria a través de un sitio web manipulado, también conocido como 'Scripting Engine Information Disclosure Vulnerability'. • http://www.securitytracker.com/id/1033800 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-108 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 94%CPEs: 10EXPL: 1

The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted replace operation with a JavaScript regular expression, aka "Scripting Engine Memory Corruption Vulnerability." Los motores Microsoft (1) VBScript 5.7 y 5.8 y (2) JScript 5.7 y 5.8, tal como se utiliza en Internet Explorer 8 hasta la versión 11 y otros productos, permiten a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de una operación de sustitución manipulada con una expresión regular JavaScript, también conocido como 'Scripting Engine Memory Corruption Vulnerability'. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to search and replace operations performed using JavaScript regular expressions. An attacker can cause the in-memory representation of a regular expression to be freed while it is being used in a replace operation. • https://www.exploit-db.com/exploits/40798 http://seclists.org/fulldisclosure/2015/Oct/54 http://www.securitytracker.com/id/1033800 http://www.zerodayinitiative.com/advisories/ZDI-15-515 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-106 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-108 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 48%CPEs: 9EXPL: 0

vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." vbscript.dll en Microsoft VBScript versión 5.6 a la 5.8, tal como se utiliza con Internet Explorer versión 6 a la 11 y otros productos, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicios mediante la corrupción de memoria a través de un sitio web específicamente diseñado para este fin, error conocido como 'VBScript Memory Corruption Vulnerability.' • http://www.securitytracker.com/id/1032894 http://www.securitytracker.com/id/1032895 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-066 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.3EPSS: 77%CPEs: 7EXPL: 0

The Microsoft (1) VBScript 5.6 through 5.8 and (2) JScript 5.6 through 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript and JScript ASLR Bypass." Los motores Microsoft (1) VBScript 5.6 hasta 5.8 y (2) JScript 5.6 hasta 5.8, utilizados en Internet Explorer 8 hasta 11 y otros productos, permiten a atacantes remotos evadir el mecanismo de protección ASLR a través de un sitio web manipulado, también conocido como 'evasión de ASLR de VBScript y JScript.' • http://www.securityfocus.com/bid/74530 http://www.securitytracker.com/id/1032282 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-053 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.0EPSS: 84%CPEs: 7EXPL: 0

VBScript.dll in the Microsoft VBScript 5.6 through 5.8 engine, as used in Internet Explorer 8 through 11 and other products, allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript ASLR Bypass." VBScript.dll en el motor Microsoft VBScript 5.6 hasta 5.8, utilizado en Internet Explorer 8 hasta 11 y otros productos, permite a atacantes remotos evadir el mecanismo de protección ASLR a través de un sitio web manipulado, también conocido como 'evasión de ASLR de VBScript.' This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how VBScript processes capturing groups in regular expressions. By performing a search using a regular expression that has an unusual form, an attacker can reveal data stored in the memory of the current process. • http://www.securityfocus.com/bid/74522 http://www.securitytracker.com/id/1032282 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-043 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-053 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •