Page 46 of 324 results (0.005 seconds)

CVSS: 5.0EPSS: 2%CPEs: 3EXPL: 0

Internet Explorer 5.01, 5.5 and 6.0 does not properly handle the Content-Type HTML header field, which allows remote attackers to modify which application is used to process a document. Internet Explorer 5.01, 5.5 y 6.0 no maneja apropiadamente la cabecera HTML "Content-Type", lo que permite a atacantes remotos modificar qué aplicación es usada para procesar un documento. • http://online.securityfocus.com/archive/1/255767 http://www.securityfocus.com/bid/4085 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-005 https://exchange.xforce.ibmcloud.com/vulnerabilities/8118 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

File Download box in Internet Explorer 5.01, 5.5 and 6.0 allows an attacker to use the Content-Disposition and Content-Type HTML header fields to modify how the name of the file is displayed, which could trick a user into believing that a file is safe to download. El cuadro de diálogo de descarga de ficheros en Internet Explorer 5.0, 5.5 y 6.0 permite a un atacante usar los campos de cabecera HTML "Content-Type" y "Content-Disposition" para modificar como el nombre del fichero es mostrado, lo que podría engañar a un usuario para que piense que es seguro descargar el fichero. • http://www.securityfocus.com/bid/4087 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-005 •

CVSS: 5.0EPSS: 14%CPEs: 7EXPL: 0

Internet Explorer 6.0 and earlier does not properly handle VBScript in certain domain security checks, which allows remote attackers to read arbitrary files. Internet Explorer 6.0 y anteriores no maneja adecuadamente VBScript en ciertas comprobaciones de seguridad de dominios, lo que permite a atacantes remotos leer ficheros arbitrarios. • http://securitytracker.com/id?1003630 http://www.osvdb.org/763 http://www.securityfocus.com/bid/4158 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-009 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 1

Internet Explorer 5.5 and 6.0 allows remote attackers to read certain files and spoof the URL in the address bar by using the Document.open function to pass information between two frames from different domains, a new variant of the "Frame Domain Verification" vulnerability described in MS:MS01-058/CAN-2001-0874. Internet Explorer 5.5 y 6.0 permite a atacantes remotos leer ciertos ficheros y falsificar la URL en la barra de direcciones usando la función document.open() para pasar información entre dos marcos de distintos dominios. Es una nueva variante de la vulnerabilidad "Verificación de dominio de marco", descrita en Microsoft Security Bulletin MS01-058 / CAN-2001-0847. • http://www.osvdb.org/3031 http://www.securityfocus.com/archive/1/246522 http://www.securityfocus.com/bid/3721 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-005 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A974 •

CVSS: 7.5EPSS: 9%CPEs: 2EXPL: 0

Buffer overflow in the implementation of an HTML directive in mshtml.dll in Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code via a web page that specifies embedded ActiveX controls in a way that causes 2 Unicode strings to be concatenated. Desbordamiento de buffer en la implementación de una directiva HTML en mshml.dll en Internet Explorer 5.5 y 6.0 permite ejecutar código arbitrario mediante una página web que especifica controles ActiveX en una forma que causa que 2 cadenas Unicode sean concatenadas. • http://marc.info/?l=bugtraq&m=101362984930597&w=2 http://online.securityfocus.com/archive/1/258614 http://www.cert.org/advisories/CA-2002-04.html http://www.iss.net/security_center/static/8116.php http://www.securityfocus.com/bid/4080 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-005 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A925 •