CVE-2006-4697
https://notcve.org/view.php?id=CVE-2006-4697
Microsoft Internet Explorer 5.01, 6, and 7 uses certain COM objects from Imjpcksid.dll as ActiveX controls, which allows remote attackers to execute arbitrary code via unspecified vectors. NOTE: this issue might be related to CVE-2006-4193. Microsoft Internet Explorer 5.01, 6, y 7 utiliza ciertos objetos COM de Imjpcksid.dll como controles ActiveX, lo cual permite a atacantes remotos ejecutar código de su elección mediante vectores no especificados. NOTA: este asunto podría estar relacionado con CVE-2006-4193. • http://secunia.com/advisories/24156 http://www.kb.cert.org/vuls/id/753924 http://www.osvdb.org/31891 http://www.securityfocus.com/bid/22486 http://www.us-cert.gov/cas/techalerts/TA07-044A.html http://www.vupen.com/english/advisories/2007/0584 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-016 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1120 •
CVE-2007-0217 – Microsoft Internet Explorer - FTP Server Response Denial of Service (MS07-016)
https://notcve.org/view.php?id=CVE-2007-0217
The wininet.dll FTP client code in Microsoft Internet Explorer 5.01 and 6 might allow remote attackers to execute arbitrary code via an FTP server response of a specific length that causes a terminating null byte to be written outside of a buffer, which causes heap corruption. El código del cliente FTP wininet.dll en Microsoft Internet Explorer 5.01 y 6 podría permitir a atacantes remotos ejecutar código de su elección mediante una respuesta FTP del servidor de una longitud específica que provoca que el byte nulo de terminación sea escrito fuera del búfer, lo cual provoca la corrupción de la pila. • https://www.exploit-db.com/exploits/3444 http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=473 http://secunia.com/advisories/24156 http://www.kb.cert.org/vuls/id/613564 http://www.osvdb.org/31892 http://www.securityfocus.com/archive/1/462303/100/0/threaded http://www.securityfocus.com/bid/22489 http://www.securitytracker.com/id?1017642 http://www.us-cert.gov/cas/techalerts/TA07-044A.html http://www.vupen.com/english/advisories/2007/0584 https: •
CVE-2007-0811 – Microsoft Internet Explorer 6 - 'mshtml.dll' Null Pointer Dereference
https://notcve.org/view.php?id=CVE-2007-0811
Microsoft Internet Explorer 6.0 SP1 on Windows 2000, and 6.0 SP2 on Windows XP, allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an HTML document containing a certain JavaScript for loop with an empty loop body, possibly involving getElementById. Microsoft Internet Explorer 6.0 SP1 en Windows 2000, y 6.0 SP2 en Windows XP, permite a atacantes remotos provocar una denegación de servicio (referencia a puntero nulo y caída de aplicación) mediante un documento HTML conteniendo código JavaScript concreto para un bucle, con cuerpo de bucle vacío, posiblemente involucrando la función getElementById. • https://www.exploit-db.com/exploits/3272 http://osvdb.org/37636 http://www.powerhacker.net/exploit/IE_NULL_CRASH.html http://www.securityfocus.com/bid/22408 •
CVE-2007-0612 – Microsoft Internet Explorer 5.0.1 - Multiple ActiveX Controls Denial of Service Vulnerabilities
https://notcve.org/view.php?id=CVE-2007-0612
Multiple ActiveX controls in Microsoft Windows 2000, XP, 2003, and Vista allows remote attackers to cause a denial of service (Internet Explorer crash) by accessing the bgColor, fgColor, linkColor, alinkColor, vlinkColor, or defaultCharset properties in the (1) giffile, (2) htmlfile, (3) jpegfile, (4) mhtmlfile, (5) ODCfile, (6) pjpegfile, (7) pngfile, (8) xbmfile, (9) xmlfile, (10) xslfile, or (11) wdfile objects in (a) mshtml.dll; or the (12) TriEditDocument.TriEditDocument or (13) TriEditDocument.TriEditDocument.1 objects in (b) triedit.dll, which cause a NULL pointer dereference. Múltiples controles de ActiveX en el Microsoft Windows 2000, XP, 2003 y Vista permiten a atacantes remotos provocar una denegación de servicio (caída del Internet Explorer) mediante el acceso a las propiedades bgColor, fgColor, linkColor, alinkColor, vlinkColor o defaultCharset en los objetos (1) giffile, (2) htmlfile, (3) jpegfile, (4) mhtmlfile, (5) ODCfile, (6) pjpegfile, (7) pngfile, (8) xbmfile, (9) xmlfile, (10) xslfile o (11) wdfile objects en (a) mshtml.dll; o en los objetos (12) TriEditDocument.TriEditDocument o (13) TriEditDocument.TriEditDocument.1 en (b) triedit.dll, lo que provoca una referencia a un puntero NULO (NULL). • https://www.exploit-db.com/exploits/29536 http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0547.html http://lists.grok.org.uk/pipermail/full-disclosure/2007-January/052057.html http://osvdb.org/32628 http://securityreason.com/securityalert/2199 http://www.determina.com/security.research/vulnerabilities/activex-bgcolor.html http://www.securityfocus.com/archive/1/458443/100/0/threaded http://www.securityfocus.com/bid/22288 https://exchange.xforce.ibmcloud.com/vulnerabilities/31867 •
CVE-2007-0356 – CCRP Folder Treeview Control (ccrpftv6.ocx) - IE Denial of Service
https://notcve.org/view.php?id=CVE-2007-0356
The Common Controls Replacement Project (CCRP) FolderTreeview (FTV) ActiveX control (ccrpftv6.ocx) allows remote attackers to cause a denial of service (Internet Explorer 7 crash) via a long CCRP.RootFolder property value. The Common Controls Replacement Project (CCRP) FolderTreeview (FTV) Control ActiveX (ccrpftv6.ocx) permite a atacantes remotos provocar una denegación de servicio (caída de Internet Explorer 7) mediante un valor de propiedad CCRP.RootFolder largo. • https://www.exploit-db.com/exploits/3142 http://www.securityfocus.com/bid/22092 https://exchange.xforce.ibmcloud.com/vulnerabilities/31549 •