Page 7 of 135 results (0.014 seconds)

CVSS: 9.3EPSS: 96%CPEs: 13EXPL: 2

Integer overflow in the Vector Markup Language (VML) implementation (vgx.dll) in Microsoft Internet Explorer 5.01, 6, and 7 on Windows 2000 SP4, XP SP2, Server 2003, and Server 2003 SP1 allows remote attackers to execute arbitrary code via a crafted web page that contains unspecified integer properties that cause insufficient memory allocation and trigger a buffer overflow, aka the "VML Buffer Overrun Vulnerability." Debordamiento de Entero en la implementación (vgx.dll) del Lenguaje de Marcas de Vectores (VML) en Microsoft Internet Explorer 5.01, 6, y 7 en Windows 2000 SP4, XP SP2, Server 2003, y Server 2003 SP1 permite a atacantes remotos ejecutar código de su elección mediante una página web manipulada que contiene propiedades no especificadas tipo entero que provocan insufiencte reserva de memoria y dispara un desbordamiento de búfer, también conocido como la "Vulnerabilidad de desbordamiento de búfer VML". • https://www.exploit-db.com/exploits/3148 https://www.exploit-db.com/exploits/3137 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=462 http://secunia.com/advisories/23677 http://securitytracker.com/id?1017489 http://support.avaya.com/elmodocs2/security/ASA-2007-009.htm http://support.microsoft.com/?kbid=929969 http://www.kb.cert.org/vuls/id/122084 http://www.osvdb.org/31250 http://www.securityfocus.com/archive/1/457053/100/0/threaded http://w •

CVSS: 7.6EPSS: 97%CPEs: 1EXPL: 3

Heap-based buffer overflow in the DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) for Internet Explorer 6.0 SP1, on Chinese and possibly other Windows distributions, allows remote attackers to execute arbitrary code via unknown manipulations in arguments to the KeyFrame method, possibly related to an integer overflow, as demonstrated by daxctle2, and a different vulnerability than CVE-2006-4446. Desbordamiento de búfer basado en montón en el DirectAnimation Path Control (DirectAnimation.PathControl) COM object (daxctle.ocx) para el Internet Explorer 6.0 SP1 en chino y posiblemente en otras distribuciones de, permite a un atacante remoto ejecutar código de su elección a través de manipulaciones desconocidas en los argumentos del método KeyFrame, relacionado posiblemente con un desbordamiento del número entero, según lo demostrado por daxctle2, y una vulnerabilidad diferente a la CVE-2006-4446. • https://www.exploit-db.com/exploits/2358 https://www.exploit-db.com/exploits/16506 https://github.com/Mario1234/js-driveby-download-CVE-2006-4777 http://secunia.com/advisories/21910 http://securityreason.com/securityalert/1577 http://securitytracker.com/id?1016854 http://www.kb.cert.org/vuls/id/377369 http://www.microsoft.com/technet/security/advisory/925444.mspx http://www.osvdb.org/28842 http://www.securityfocus.com/archive/1/445898/100/0/threaded http://www.security • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 16%CPEs: 10EXPL: 0

Heap-based buffer overflow in URLMON.DLL in Microsoft Internet Explorer 6 SP1 on Windows 2000 and XP SP1, with versions the MS06-042 patch before 20060912, allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a long URL in a GZIP-encoded website that was the target of an HTTP redirect, due to an incomplete fix for CVE-2006-3869. Desbordamiento de búfer basado en montón en URLMON.DLL en Microsoft Internet Explorer 6 SP1 sobre Windows 2000 y XP SP1, con versiones del parche MS06-042 anterior a 12/09/2006, permite a un atacante remoto provocar denegación de servicio(caida) o ejecutar código de su elección a través de una URL grande en un sitio web GZIP-codificado que fue el objetivo de una redirección HTTP, debido a un arreglo incompleto del CVE-2006-3869. • http://research.eeye.com/html/advisories/published/AD20060912.html http://securityreason.com/securityalert/1555 http://securitytracker.com/id?1016839 http://weblog.infoworld.com/techwatch/archives/007870.html http://www.osvdb.org/30834 http://www.securityfocus.com/archive/1/445835/100/0/threaded http://www.securityfocus.com/bid/19987 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 https://exchange.xforce.ibmcloud.com/vulnerabilities/28893 •

CVSS: 7.5EPSS: 96%CPEs: 21EXPL: 1

Microsoft Internet Explorer allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code by instantiating certain Windows 2000 ActiveX COM Objects including (1) ciodm.dll, (2) myinfo.dll, (3) msdxm.ocx, and (4) creator.dll. Microsoft Internet Explorer permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria) y posiblemente ejecutar código de su elección instanciando ciertos objetos Windows 2000 ActiveX COM incluyendo (1) ciodm.dll, (2) myinfo.dll, (3) msdxm.ocx, y (4) creator.dll. • https://www.exploit-db.com/exploits/28420 http://securityreason.com/securityalert/1474 http://www.securityfocus.com/archive/1/443896/100/100/threaded http://www.securityfocus.com/bid/19636 http://www.xsec.org/index.php?module=Releases&act=view&type=1&id=16 https://exchange.xforce.ibmcloud.com/vulnerabilities/28512 •

CVSS: 5.0EPSS: 96%CPEs: 1EXPL: 2

Heap-based buffer overflow in DirectAnimation.PathControl COM object (daxctle.ocx) in Microsoft Internet Explorer 6.0 SP1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a Spline function call whose first argument specifies a large number of points. Desbordamiento de búfer basado en montículo en el objeto COM DirectAnimation.PathControl (daxctle.ocx) en Microsoft Internet Explorer 6.0 SP1 permite a atacantes remotos provocar una denegación de servicio y posiblemente ejecutar código de su elección mediante una llamada a la función Spline cuyo primer argumento especifica un número grande de puntos. • https://www.exploit-db.com/exploits/28438 http://secunia.com/advisories/21910 http://securityreason.com/securityalert/1468 http://securitytracker.com/id?1016764 http://www.osvdb.org/28841 http://www.securityfocus.com/archive/1/444504/100/0/threaded http://www.securityfocus.com/bid/19738 http://www.us-cert.gov/cas/techalerts/TA06-318A.html http://www.xsec.org/index.php?module=releases&act=view&type=1&id=19 https://docs.microsoft.com/en-us/security-updates/securitybulletins& •