Page 5 of 219 results (0.008 seconds)

CVSS: 9.3EPSS: 82%CPEs: 12EXPL: 0

15 Apr 2009 — Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 on Windows XP SP2 and SP3, and 6 on Windows Server 2003 SP1 and SP2 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability." Vulnerabilidad no especificada en Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 en Windows XP SP2 y SP3, y 6 en Windows Server 2003 SP1 y SP2 permite... • http://osvdb.org/53625 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 9.3EPSS: 47%CPEs: 29EXPL: 0

15 Apr 2009 — Microsoft Internet Explorer 5.01 SP4, 6 SP1, 6 and 7 on Windows XP SP2 and SP3, 6 and 7 on Windows Server 2003 SP1 and SP2, 7 on Windows Vista Gold and SP1, and 7 on Windows Server 2008 allows remote attackers to execute arbitrary code via a web page that triggers presence of an object in memory that was (1) not properly initialized or (2) deleted, aka "Uninitialized Memory Corruption Vulnerability." Microsoft Internet Explorer v5.01 SP4, v6 SP1, v6 y v7 en Windows XP SP2 y SP3, v6 y v7 en Windows Server 20... • http://secunia.com/advisories/34678 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 97%CPEs: 4EXPL: 6

11 Dec 2008 — Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a crafted HTML or XML document, as demonstrated by nested SPAN or MARQUEE elements, and exploited in the wild in December 2008. Una vulnerabilidad de uso de la memoria previamente liberada en la función CRecordInst... • https://www.exploit-db.com/exploits/7410 • CWE-399: Resource Management Errors •

CVSS: 8.8EPSS: 13%CPEs: 28EXPL: 0

10 Dec 2008 — Microsoft Internet Explorer 7 sometimes attempts to access a deleted object, which allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Uninitialized Memory Corruption Vulnerability." Microsoft Internet Explorer 7 en ocasiones intenta acceder a objetos que han sido eliminados; esto permite a atacantes remotos ejecutar código de su elección a través de un documento HTML manipulado que provoca una corrupción de memoria. También se conoce como "Vul... • http://www.securitytracker.com/id?1021371 • CWE-399: Resource Management Errors •

CVSS: 8.8EPSS: 95%CPEs: 28EXPL: 0

10 Dec 2008 — Microsoft Internet Explorer 5.01 SP4 and 6 SP1 does not properly validate parameters during calls to navigation methods, which allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Parameter Validation Memory Corruption Vulnerability." Microsoft Internet Explorer v5.01 SP4 y v6 SP1, no valida adecuadamente los parámetros en las llamadas a los métodos de navegación; esto permite a atacantes remotos ejecutar código de su elección a través de un doc... • http://www.securitytracker.com/id?1021371 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 17%CPEs: 28EXPL: 0

10 Dec 2008 — Stack-based buffer overflow in Microsoft Internet Explorer 5.01 SP4, 6 SP1 on Windows 2000, and 6 on Windows XP and Server 2003 does not properly handle extraneous data associated with an object embedded in a web page, which allows remote attackers to execute arbitrary code via crafted HTML tags that trigger memory corruption, aka "HTML Rendering Memory Corruption Vulnerability." El desbordamiento del búfer en región stack de la memoria en Microsoft Internet Explorer versiones 5.01 SP4, 6 SP1 en Windows 200... • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=761 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 94%CPEs: 28EXPL: 0

09 Dec 2008 — Microsoft Internet Explorer 7 sometimes attempts to access uninitialized memory locations, which allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, related to a WebDAV request for a file with a long name, aka "HTML Objects Memory Corruption Vulnerability." Microsoft Internet Explorer versión 7 algunas veces intenta acceder a las ubicaciones de memoria no inicializadas, lo que permite a los atacantes remotos ejecutar código arbitrario por medio de u... • http://www.securityfocus.com/archive/1/499065/100/0/threaded • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 92%CPEs: 28EXPL: 0

15 Oct 2008 — Microsoft Internet Explorer 6 and 7 does not properly determine the domain or security zone of origin of web script, which allows remote attackers to bypass the intended cross-domain security policy, and execute arbitrary code or obtain sensitive information, via a crafted HTML document, aka "HTML Element Cross-Domain Vulnerability." Microsoft Internet Explorer 6 y 7 no determina correctamente el dominio o zona de seguridad original de un script, lo que permite a un atacante remoto eludir la política de seg... • http://marc.info/?l=bugtraq&m=122479227205998&w=2 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 94%CPEs: 28EXPL: 0

15 Oct 2008 — Microsoft Internet Explorer 5.01 SP4 and 6 does not properly handle errors associated with access to uninitialized memory, which allows remote attackers to execute arbitrary code via a crafted HTML document, aka "HTML Objects Memory Corruption Vulnerability." Microsoft Internet Explorer 5.01 SP4 y 6 no gestiona correctamente los errores asociados con el acceso a memoria no inicializada, lo que permite a atacantes remotos ejecutar código de su elección mediante un documento HTML, también conocido como "HTML ... • http://marc.info/?l=bugtraq&m=122479227205998&w=2 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 95%CPEs: 29EXPL: 0

15 Oct 2008 — Microsoft Internet Explorer 6 and 7 does not properly determine the domain or security zone of origin of web script, which allows remote attackers to bypass the intended cross-domain security policy, and execute arbitrary code or obtain sensitive information, via a crafted HTML document, aka "Event Handling Cross-Domain Vulnerability." Microsoft Internet Explorer v6 y v7 no determina de forma adecuada el dominio o zona de seguridad del origen de la secuencia de comandos web, lo que permite a atacantes remot... • http://marc.info/?l=bugtraq&m=122479227205998&w=2 • CWE-264: Permissions, Privileges, and Access Controls •