Page 82 of 715 results (0.010 seconds)

CVSS: 9.3EPSS: 96%CPEs: 9EXPL: 0

Microsoft Internet Explorer 5.01, 6, and 7 allows remote attackers to execute arbitrary code by causing Internet Explorer to access an uninitialized or deleted object, related to prototype variables and table cells, aka "Uninitialized Memory Corruption Vulnerability." Microsoft Internet Explorer versiones 5.01, 6 y 7 permite a los atacantes remotos ejecutar código arbitrario causando que Internet Explorer acceda a un objeto no inicializado o eliminado, relacionado con variables prototipo y celdas de tabla, también se conoce como "Uninitialized Memory Corruption Vulnerability". This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The flaw is specifically exposed when a prototype variable points to a table cell and then that table cell is removed. This results in an invalid pointer dereference which can be leveraged to result in arbitrary code execution. • http://osvdb.org/35351 http://secunia.com/advisories/25627 http://securitytracker.com/id?1018235 http://www.securityfocus.com/archive/1/471210/100/0/threaded http://www.securityfocus.com/archive/1/471947/100/0/threaded http://www.securityfocus.com/bid/24418 http://www.us-cert.gov/cas/techalerts/TA07-163A.html http://www.vupen.com/english/advisories/2007/2153 http://www.zerodayinitiative.com/advisories/ZDI-07-038.html https://docs.microsoft.com/en-us/security-updates/ • CWE-908: Use of Uninitialized Resource •

CVSS: 10.0EPSS: 36%CPEs: 3EXPL: 1

Buffer overflow in the Provideo Camimage ActiveX control in ISSCamControl.dll 1.0.1.5, when Internet Explorer 6 is used on Windows 2000 SP4, allows remote attackers to execute arbitrary code via a long URL property value. Desbordamiento de búfer en el control de ActiveX Provideo Camimage en el ISSCamControl.dll 1.0.1.5, cuando el Internet Explorer 6 se usa bajo Windows 2000 SP4, permite a atacantes remotos ejecutar código de su elección mediante una valor en la propiedad URL largo. • https://www.exploit-db.com/exploits/4023 http://osvdb.org/36962 http://secunia.com/advisories/25479 http://www.securityfocus.com/bid/24279 http://www.vupen.com/english/advisories/2007/2042 https://exchange.xforce.ibmcloud.com/vulnerabilities/34691 •

CVSS: 7.1EPSS: 96%CPEs: 24EXPL: 0

Race condition in Microsoft Internet Explorer 6 SP1; 6 and 7 for Windows XP SP2 and SP3; 6 and 7 for Server 2003 SP2; 7 for Vista Gold, SP1, and SP2; and 7 for Server 2008 SP2 allows remote attackers to execute arbitrary code or perform other actions upon a page transition, with the permissions of the old page and the content of the new page, as demonstrated by setInterval functions that set location.href within a try/catch expression, aka the "bait & switch vulnerability" or "Race Condition Cross-Domain Information Disclosure Vulnerability." Una condición de carrera en Microsoft Internet Explorer versión 6 SP1; versiones 6 y 7 para Windows XP SP2 y SP3; versiones 6 y versión 7 para Server 2003 SP2; versión 7 para Vista Gold, SP1 y SP2; y versión 7 para Server 2008 SP2 permite a los atacantes remotos ejecutar código arbitrario o realizar otras acciones en una transición de página, con los permisos de la página antigua y el contenido de la página nueva, como es demostrado por las funciones setInterval que configuran el archivo location.href dentro de una expresión try/catch, también se conoce como "bait & switch vulnerability" o "Race Condition Cross-Domain Information Disclosure Vulnerability." • http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0026.html http://lcamtuf.coredump.cx/ierace http://osvdb.org/38497 http://osvdb.org/54944 http://secunia.com/advisories/25564 http://securityreason.com/securityalert/2781 http://securitytracker.com/id?1018192 http://www.kb.cert.org/vuls/id/471361 http://www.securityfocus.com/archive/1/470446/100/0/threaded http://www.securityfocus.com/bid/24283 http://www.us-cert.gov/cas/techalerts/TA09-160A.html http:/ • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 9.3EPSS: 12%CPEs: 3EXPL: 1

Microsoft Internet Explorer 6 allows remote attackers to spoof the URL bar, and page properties including SSL certificates, by interrupting page loading through certain use of location DOM objects and setTimeout calls. NOTE: this issue can be leveraged for phishing and other attacks. Microsoft Internet Explorer 6 permite a atacantes remotos falsificar la barra de URL, y las propiedades de la página incluyendo certificados SSL, interrumpiendo la carga de la página mediante determinado uso de objetos de localización DOM y llamadas a setTimeout. NOTA: este problema puede ser aprovechado para ataques de fraude (phishing) y otros. • http://archives.neohapsis.com/archives/fulldisclosure/2007-06/0026.html http://lcamtuf.coredump.cx/ietrap2 http://osvdb.org/45437 http://secunia.com/advisories/25564 http://securityreason.com/securityalert/2781 http://securitytracker.com/id?1018193 http://www.securityfocus.com/archive/1/470446/100/0/threaded http://www.securityfocus.com/bid/24298 https://exchange.xforce.ibmcloud.com/vulnerabilities/34705 •

CVSS: 10.0EPSS: 36%CPEs: 2EXPL: 1

Buffer overflow in the BaseRunner ActiveX control in the Ademco ATNBaseLoader100 Module (ATNBaseLoader100.dll) 5.4.0.6, when Internet Explorer 6 is used, allows remote attackers to execute arbitrary code via a long argument to the (1) Send485CMD method, and possibly the (2) SetLoginID, (3) AddSite, (4) SetScreen, and (5) SetVideoServer methods. Desbordamiento de búfer en el controlado ActiveX BaseRunner en el módulo Ademco ATNBaseLoader100 (ATNBaseLoader100.dll) 5.4.0.6, cuando se está utilizando Internet Explorer 6, permite a atacantes remotos ejecutar código de su elección a través de argumentos largos en los métodos (1) Send485CMD , y posiblemente el (2) SetLoginID, (3) AddSite, (4) SetScreen, y (5) SetVideoServer. • https://www.exploit-db.com/exploits/3993 http://osvdb.org/36700 http://secunia.com/advisories/25430 http://www.securityfocus.com/bid/24172 http://www.vupen.com/english/advisories/2007/1958 https://exchange.xforce.ibmcloud.com/vulnerabilities/34548 •