Page 77 of 625 results (0.009 seconds)

CVSS: 7.5EPSS: 16%CPEs: 29EXPL: 0

Microsoft Internet Explorer 5.01 through 7 allows remote attackers to spoof the URL address bar and other "trust UI" components via unspecified vectors, a different issue than CVE-2007-1091 and CVE-2007-3826. Microsoft Internet Explorer 5.01 hasta 7 permite a atacantes remotos falsificar la barra de direcciones URL y otras "Interfaces de Usuario de confianza" mediante vectores no especificados, un asunto diferente que CVE-2007-1091 y CVE-2007-3826. • http://secunia.com/advisories/27133 http://securitytracker.com/id?1018788 http://www.securityfocus.com/archive/1/482366/100/0/threaded http://www.securityfocus.com/bid/25915 http://www.us-cert.gov/cas/techalerts/TA07-282A.html http://www.vupen.com/english/advisories/2007/3437 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2244 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 82%CPEs: 29EXPL: 0

Unspecified vulnerability in Microsoft Internet Explorer 5.01 through 7 allows remote attackers to execute arbitrary code via unspecified vectors involving memory corruption from an unhandled error. Vulnerabilidad no especificada en Microsoft Internet Explorer 5.01 hasta 7 permite a atacantes remotos ejecutar código de su elección mediante vectores no especificados que implican corrupción de memoria debido a un error no controlado. • http://secunia.com/advisories/23469 http://securitytracker.com/id?1018788 http://www.securityfocus.com/archive/1/482366/100/0/threaded http://www.securityfocus.com/bid/25916 http://www.us-cert.gov/cas/techalerts/TA07-282A.html http://www.vupen.com/english/advisories/2007/3437 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-057 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2284 • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Microsoft Internet Explorer 6 drops DNS pins based on failed connections to irrelevant TCP ports, which makes it easier for remote attackers to conduct DNS rebinding attacks, as demonstrated by a port 81 URL in an IMG SRC, when the DNS pin had been established for a session on port 80, a different issue than CVE-2006-4560. Microsoft Internet Explorer 6 borra asignaciones DNS fijas en conexiones fallidas a puertos TCP irrelevantes, lo cual hace más fácil para atacantes remotos llevar a cabo ataques de revinculación DNS, como ha sido demostrado por el puesto 81 en un IMG SRC, cuando la asignación DNS fija ha sido establecida por una sesión en el puesto 80, un asunto diferente que CVE-2006-4560. • http://crypto.stanford.edu/dns/dns-rebinding.pdf http://osvdb.org/45525 •

CVSS: 4.3EPSS: 6%CPEs: 1EXPL: 1

The focus handling for the onkeydown event in Microsoft Internet Explorer 6.0 allows remote attackers to change field focus and copy keystrokes via a certain use of a JavaScript htmlFor attribute, as demonstrated by changing focus from a textarea to a file upload field, a related issue to CVE-2007-3511. La gestión del foco del evento onkeydown de Microsoft Internet Explorer 6.0 permite a atacantes remotos cambiar el foco del campo y copiar pulsaciones de teclas mediante un uso determinado del atributo JavaScript htmlFor, como se demuestra al cambiar el foco de un área de texo a un campo de promoción de fichero, vulnerabilidad similar a CVE-2007-3511. • https://www.exploit-db.com/exploits/30622 http://osvdb.org/41382 http://secunia.com/advisories/27007 http://www.0x000000.com/index.php?i=437 http://www.securityfocus.com/bid/25836 https://exchange.xforce.ibmcloud.com/vulnerabilities/36848 •

CVSS: 4.3EPSS: 0%CPEs: 44EXPL: 1

Microsoft Internet Explorer 4.0 through 7 allows remote attackers to determine the existence of local files that have associated images via a res:// URI in the src property of a JavaScript Image object, as demonstrated by the URI for a bitmap image resource within a (1) .exe or (2) .dll file. Microsoft Internet Explorer 4.0 hasta 7 permite a atacantes remotos determinar la existencia de archivos locales que tienen imágenes asociadas mediante un URI res:// en la propiedad src de un objeto Image de JavaScript, como se ha demostrado con el URI de un recurso de imagen bitmap dentro de un archivo (1) .exe o (2) .dll. • http://osvdb.org/37638 http://xs-sniper.com/blog/2007/07/20/more-uri-stuff-ies-resouce-uri •