Page 42 of 840 results (0.011 seconds)

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 0

12 Dec 2008 — Norman Antivirus 5.80.02, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. Norman Antivirus v5.80.02, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un documento HT... • http://securityreason.com/securityalert/4723 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 0

12 Dec 2008 — DrWeb Anti-virus 4.44.0.09170, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. DrWeb Anti-virus v4.44.0.09170, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un do... • http://securityreason.com/securityalert/4723 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 0%CPEs: 4EXPL: 0

12 Dec 2008 — Sunbelt VIPRE 3.1.1832.2 and possibly 3.1.1633.1, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. Sunbelt VIPRE v3.1.1832.2 y posiblemente v3.1.1633.1, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remoto... • http://securityreason.com/securityalert/4723 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 0%CPEs: 2EXPL: 0

12 Dec 2008 — CA eTrust Antivirus 31.6.6086, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. CA eTrust Antivirus v31.6.6086, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un do... • http://securityreason.com/securityalert/4723 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 0

12 Dec 2008 — avast! antivirus 4.8.1281.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. avast! antivirus v4.8.1281.0, cuando se utiliza Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un docume... • http://securityreason.com/securityalert/4723 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 0%CPEs: 3EXPL: 0

12 Dec 2008 — VirusBuster 4.5.11.0, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. VirusBuster v4.5.11.0, cuando se usa Internet Explorer 6 o 7, permite a atacantes remotos eludir la detección de malware en un documento HTML colocando... • http://securityreason.com/securityalert/4723 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 0%CPEs: 4EXPL: 0

12 Dec 2008 — Hacksoft The Hacker 6.3.1.2.174 and possibly 6.3.0.9.081, when Internet Explorer 6 or 7 is used, allows remote attackers to bypass detection of malware in an HTML document by placing an MZ header (aka "EXE info") at the beginning, and modifying the filename to have (1) no extension, (2) a .txt extension, or (3) a .jpg extension, as demonstrated by a document containing a CVE-2006-5745 exploit. Hacksoft The Hacker v6.3.1.2.174 y posiblemente v6.3.0.9.081, cuando se utiliza Internet Explorer 6 o 7, permite a ... • http://securityreason.com/securityalert/4723 • CWE-20: Improper Input Validation •

CVSS: 9.3EPSS: 97%CPEs: 4EXPL: 6

11 Dec 2008 — Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008. Una vulnerabilidad de uso de la memoria previamente liberada en la función CRecordInst... • https://www.exploit-db.com/exploits/7410 • CWE-399: Resource Management Errors •

CVSS: 8.8EPSS: 13%CPEs: 28EXPL: 0

10 Dec 2008 — Microsoft Internet Explorer 7 sometimes attempts to access a deleted object, which allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Uninitialized Memory Corruption Vulnerability." Microsoft Internet Explorer 7 en ocasiones intenta acceder a objetos que han sido eliminados; esto permite a atacantes remotos ejecutar código de su elección a través de un documento HTML manipulado que provoca una corrupción de memoria. También se conoce como "Vul... • http://www.securitytracker.com/id?1021371 • CWE-399: Resource Management Errors •

CVSS: 8.8EPSS: 95%CPEs: 28EXPL: 0

10 Dec 2008 — Microsoft Internet Explorer 5.01 SP4 and 6 SP1 does not properly validate parameters during calls to navigation methods, which allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Parameter Validation Memory Corruption Vulnerability." Microsoft Internet Explorer v5.01 SP4 y v6 SP1, no valida adecuadamente los parámetros en las llamadas a los métodos de navegación; esto permite a atacantes remotos ejecutar código de su elección a través de un doc... • http://www.securitytracker.com/id?1021371 • CWE-399: Resource Management Errors •