Page 40 of 686 results (0.008 seconds)

CVSS: 7.6EPSS: 25%CPEs: 14EXPL: 0

The OLE Automation mechanism and VBScript scripting engine in Microsoft Internet Explorer 9 through 11, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability." El mecanismo OLE Automation y el motor de secuencias de comandos VBScript en Microsoft Internet Explorer 9 hasta la versión 11, Windows Vista SP2, Windows Server 2008 SP2 y R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold y R2, Windows RT 8.1 y Windows 10 Gold, 1511 y 1607 permiten a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, vulnerabilidad también conocida como "Scripting Engine Memory Corruption Vulnerability". This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the Update method of the Recordset object implemented by Microsoft ActiveX Data Objects (ADO). By performing actions in script an attacker can cause a pointer to be reused after it has been freed. • http://www.securityfocus.com/bid/92835 http://www.securitytracker.com/id/1036788 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-104 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-116 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.6EPSS: 46%CPEs: 4EXPL: 0

Microsoft Internet Explorer 9 through 11 and Edge allow remote attackers to execute arbitrary code via a crafted web page, aka "Microsoft Browser Memory Corruption Vulnerability." Microsoft Internet Explorer 9 hasta la versión 11 y Edge permiten a atacantes remotos ejecutar código arbitrario a través de una página web manipulada, también conocida como "Microsoft Browser Memory Corruption Vulnerability". • http://www.securityfocus.com/bid/92305 http://www.securitytracker.com/id/1036562 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-095 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-096 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.3EPSS: 39%CPEs: 4EXPL: 0

Microsoft Internet Explorer 9 through 11 and Edge allow remote attackers to obtain sensitive information via a crafted web page, aka "Microsoft Browser Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3326. Microsoft Internet Explorer 9 hasta la versión 11 y Edge permiten a atacantes remotos obtener información sensible a través de una página web manipulada, también conocida como "Microsoft Browser Information Disclosure Vulnerability", una vulnerabilidad diferente a CVE-2016-3326. • http://www.securityfocus.com/bid/92284 http://www.securitytracker.com/id/1036562 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-095 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-096 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.3EPSS: 39%CPEs: 4EXPL: 0

Microsoft Internet Explorer 9 through 11 and Edge allow remote attackers to determine the existence of files via a crafted webpage, aka "Internet Explorer Information Disclosure Vulnerability." Microsoft Internet Explorer 9 hasta la versión 11 y Edge permiten a atacantes remotos determinar la existencia de archivos a través de una página web manipulada, también conocida como "Internet Explorer Information Disclosure Vulnerability". • http://www.securityfocus.com/bid/92286 http://www.securitytracker.com/id/1036562 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-095 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-096 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 2.5EPSS: 0%CPEs: 2EXPL: 0

Microsoft Internet Explorer 10 and 11 load different files for attempts to open a file:// URL depending on whether the file exists, which allows local users to enumerate files via vectors involving a file:// URL and an HTML5 sandbox iframe, aka "Internet Explorer Information Disclosure Vulnerability." Microsoft Internet Explorer 10 y 11 cargan diferentes archivos para intentos para abrir un archivo :// URL dependiendo de si el archivo existe, lo que permite a usuarios locales enumerar archivos a través de vectores que involucran un archivo :// URL y un sandbox iframe HTML5, también conocida como "Internet Explorer Information Disclosure Vulnerability". It was found that Internet Explorer allows the disclosure of local file names. This issue exists due to the fact that Internet Explorer behaves different for file:// URLs pointing to existing and non-existent files. When used in combination with HTML5 sandbox iframes it is possible to use this behavior to find out if a local file exists. • http://seclists.org/fulldisclosure/2016/Aug/44 http://www.securityfocus.com/archive/1/539174/100/0/threaded http://www.securityfocus.com/bid/92291 http://www.securitytracker.com/id/1036562 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-095 https://www.securify.nl/advisory/SFY20160301/internet_explorer_iframe_sandbox_local_file_name_disclosure_vulnerability.html https://securify.nl/advisory/SFY20160301/internet_explorer_iframe_sandbox_local_file_name_disclosure_vulnerability.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •