Page 45 of 324 results (0.011 seconds)

CVSS: 7.5EPSS: 74%CPEs: 6EXPL: 0

The zone determination function in Microsoft Internet Explorer 5.5 and 6.0 allows remote attackers to run scripts in the Local Computer zone by embedding the script in a cookie, aka the "Cookie-based Script Execution" vulnerability. La determinación de zona en Microsoft Internet Explorer 5.5 y 6.0 permite a atacantes remotos ejecutar scripts en la zona 'Ordenador Local' incrustando el script en una cookie. • http://marc.info/?l=bugtraq&m=101781180528301&w=2 http://www.iss.net/security_center/static/8701.php http://www.osvdb.org/3029 http://www.securityfocus.com/bid/4392 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-015 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A96 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Microsoft Internet Explorer 6.0 and earlier allows local users to cause a denial of service via an infinite loop for modeless dialogs showModelessDialog, which causes CPU usage while the focus for the dialog is not released. Microsoft Internet Explorer 6.0 y anteriores permiten a usuarios locales causar una negación de servicio vía bucle infinito para cuadros de diálogo sin modo (showModelessDialog), que causaran que el uso de CPU no se libere mientras el foco para el diálogo no es liberado. • http://marc.info/?l=bugtraq&m=101039104608083&w=2 http://www.iss.net/security_center/static/7826.php http://www.securityfocus.com/bid/3789 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Microsoft Internet Explorer 5.5 on Windows 98 allows remote web pages to cause a denial of service (hang) via extremely long values for form fields such as INPUT and TEXTAREA, which can be automatically filled via Javascript. Microsoft Internet Explorer 5.5 bajo Windows 98 permite a páginas web remotas causar denegación de servicio (por cuelgue de la aplicación) mediante valores muy largos en componentes de formulario como INPUT y TEXTAREA, los cuales pueden ser rellenados automáticamente mediante Javascript. • http://online.securityfocus.com/archive/1/250592 http://www.securityfocus.com/bid/3892 https://exchange.xforce.ibmcloud.com/vulnerabilities/7938 •

CVSS: 5.0EPSS: 1%CPEs: 3EXPL: 2

Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks. Internet Explorer 5.01, 5.5 y 6.0 permite a atacantes remotos leer ficheros arbitrarios mediante peticiones malformadas a la función GetObject(), lo que sortea algunas comprobaciones de seguridad de GetObject() • https://www.exploit-db.com/exploits/21195 http://archives.neohapsis.com/archives/bugtraq/2002-01/0000.html http://www.osvdb.org/3030 http://www.securityfocus.com/bid/3767 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-005 https://exchange.xforce.ibmcloud.com/vulnerabilities/7758 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A17 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A40 https:&#x •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Internet Explorer 5.5 and 6.0 allows remote attackers to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made. Internet Explorer 5.5 y 6.0 permite a atacantes remotos sortear las restricciones para ejecutar scripts mediante un objeto que procesa eventos asíncronos despues de que las comprobaciones de seguridad iniciales han sido hechas. • http://www.securityfocus.com/bid/4082 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-005 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A23 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A32 •