Page 83 of 588 results (0.010 seconds)

CVSS: 5.0EPSS: 92%CPEs: 4EXPL: 3

Internet Explorer 6 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) by setting the fonts property of the HtmlDlgSafeHelper object, which triggers a null dereference. Internet Explorer 6 on Windows XP SP2 permite a atacantes remotos provocar una denegación de servicio (caída) activando la propiedad fonts del objeto HtmlDlgSafeHelper, lo que dispara una referencia nula. • https://www.exploit-db.com/exploits/28202 http://browserfun.blogspot.com/2006/07/mobb-11-htmldlgsafehelper-fonts.html http://www.osvdb.org/27055 http://www.securityfocus.com/bid/18929 http://www.vupen.com/english/advisories/2006/2743 https://exchange.xforce.ibmcloud.com/vulnerabilities/27649 •

CVSS: 5.0EPSS: 94%CPEs: 4EXPL: 2

Internet Explorer 6 on Windows XP allows remote attackers to cause a denial of service (crash) by setting the Enabled property of a DXTFilter ActiveX object to true, which triggers a null dereference. Internet Explorer 6 on Windows XP permite a atacantes remotos provocar una denegación de servicio (caída) activando la propiedad Enabled de un objeto ActiveX DXTFilter a verdadero, lo que dispara una referencia nula. • https://www.exploit-db.com/exploits/28197 http://www.osvdb.org/27014 http://www.securityfocus.com/bid/18903 http://www.vupen.com/english/advisories/2006/2732 https://exchange.xforce.ibmcloud.com/vulnerabilities/27623 •

CVSS: 5.0EPSS: 45%CPEs: 2EXPL: 2

Microsoft Internet Explorer 6.0 and 6.0 SP1 allows remote attackers to cause a denial of service via an HTML page with an A tag containing a long title attribute. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information. Microsoft Internet Explorer 6.0 y 6.0 SP1 permite a atacantes remotos provocar una denegación de servicio a través de una página HTML con una etiqueta A que contiene un atributo de título largo. NOTA: el origen de esta información es desconocido; los detalles se han obtenido únicamente de información de terceros. • https://www.exploit-db.com/exploits/28164 http://www.osvdb.org/30822 http://www.securityfocus.com/bid/18820 •

CVSS: 5.0EPSS: 83%CPEs: 3EXPL: 2

Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by declaring the sourceURL attribute on an uninitialized DirectAnimation.StructuredGraphicsControl ActiveX Object, which triggers a null dereference. Microsoft Internet Explorer 6 permite a atacantes remotos provocar una denegación de servicio (caída) mediante la declaración del atributo sourceURL en un objeto ActiveX DirectAnimation.StructuredGraphicsControl sin inicializar, lo cual dispara un referencia a NULL. • https://www.exploit-db.com/exploits/28169 http://browserfun.blogspot.com/2006/07/mobb-6-structuredgraphicscontrol.html http://www.osvdb.org/26839 http://www.securityfocus.com/bid/18855 http://www.vupen.com/english/advisories/2006/2687 https://exchange.xforce.ibmcloud.com/vulnerabilities/27565 •

CVSS: 7.5EPSS: 96%CPEs: 1EXPL: 1

Heap-based buffer overflow in HTML Help ActiveX control (hhctrl.ocx) in Microsoft Internet Explorer 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code by repeatedly setting the Image field of an Internet.HHCtrl.1 object to certain values, possibly related to improper escaping and long strings. Desbordamiento del búfer de memoria libre para la reserva dinámica en HTML Help ActiveX control (hhctrl.ocx) en Microsoft Internet Explorer 6.0, que permite a los atacantes remotos provocar la denegación de servicios (caída de la aplicación) y posiblemente la ejecución de código arbitrario, estableciendo repetidamente el campo de imagen de un objeto Internet.HHCtrl.1 a determinados valores, posiblemente relacionados con salidas incorrectas y cadenas largas. • http://browserfun.blogspot.com/2006/07/mobb-2-internethhctrl-image-property.html http://secunia.com/advisories/20906 http://securitytracker.com/id?1016434 http://www.kb.cert.org/vuls/id/159220 http://www.osvdb.org/26835 http://www.securityfocus.com/archive/1/442733/100/0/threaded http://www.securityfocus.com/bid/18769 http://www.tippingpoint.com/security/advisories/TSRT-06-08.html http://www.us-cert.gov/cas/techalerts/TA06-220A.html http://www.vupen.com/english/advi •