CVE-2006-3354 – Microsoft Internet Explorer 6 - ADODB.Recordset Filter Property Denial of Service
https://notcve.org/view.php?id=CVE-2006-3354
Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by setting the Filter property of an ADODB.Recordset ActiveX object to certain values multiple times, which triggers a null dereference. Vulnerabilidad en el navegador web Internet Explorer v6 de Microsoft que permite a atacantes remotos causar una denegación de servicio (indisponibilidad de la aplicación) asignando a la propiedad "Filter" (filtro) de un objeto ActiveX ADODB.Recordset ciertos valores varias veces, lo que dispara un de-referenciación de un dirección (o puntero) nula. • https://www.exploit-db.com/exploits/28145 http://browserfun.blogspot.com/2006/07/mobb-1-adodbrecordset-filter-property.html http://www.osvdb.org/26834 http://www.securityfocus.com/bid/18773 https://exchange.xforce.ibmcloud.com/vulnerabilities/27596 •
CVE-2006-3280 – Microsoft Internet Explorer 5.0.1 - OuterHTML redirection Handling Information Disclosure
https://notcve.org/view.php?id=CVE-2006-3280
Cross-domain vulnerability in Microsoft Internet Explorer 6.0 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, aka "Redirect Cross-Domain Information Disclosure Vulnerability." Vulnerabilidad de dominios cruzados en Microsoft Internet Explorer v6.0 permite a atacantes remotos acceder la información restringida desde otro dominio a través de una etiqueta object con un parámetro data que referencia un enlace en el sitio original del atacante que especifica una cabecera Location HTTP que referencia un sitio objetivo, lo que luego hace que el contenido esté disponible a través del atributo outerHTML del objeto, como "Redirect Cross-Domain Information Disclosure Vulnerability." • https://www.exploit-db.com/exploits/28118 http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047398.html http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060627/3d930eda/PLEBO-2006.06.16-IE_ONE_MINOR_ONE_MAJOR.obj http://secunia.com/advisories/20825 http://secunia.com/advisories/21396 http://secunia.com/internet_explorer_information_disclosure_vulnerability_test http://securitytracker.com/id?1016388 http://www.kb.cert.org/vuls/id/883108 http://www.securityfocus •
CVE-2006-3281 – Microsoft Windows XP/2000/2003 - Explorer Drag and Drop Remote Code Execution
https://notcve.org/view.php?id=CVE-2006-3281
Microsoft Internet Explorer 6.0 does not properly handle Drag and Drop events, which allows remote user-assisted attackers to execute arbitrary code via a link to an SMB file share with a filename that contains encoded ..\ (%2e%2e%5c) sequences and whose extension contains the CLSID Key identifier for HTML Applications (HTA), aka "Folder GUID Code Execution Vulnerability." NOTE: directory traversal sequences were used in the original exploit, although their role is not clear. Microsoft Internet Explorer v6.0 no maneja apropiadamente los eventos Drag y Drop, lo que permite a atacantes remotos asistidos por el usuario ejecutar código de su elección a través de un enlace al fichero compartido SMB con un nombre que contiene una secuencia codificada ..\ (%2e%2e%5c)y cuya extensión incluye al identificador CLSID Key para HTML Applications (HTA), como "Folder GUID Code Execution Vulnerability." NOTA: la secuencia de salto de directorio fue usado en el exploit original, aunque sus roles no quedan claros. • https://www.exploit-db.com/exploits/28357 http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047398.html http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20060627/3d930eda/PLEBO-2006.06.16-IE_ONE_MINOR_ONE_MAJOR.obj http://secunia.com/advisories/20825 http://securitytracker.com/id?1016388 http://www.kb.cert.org/vuls/id/655100 http://www.securityfocus.com/bid/19389 http://www.us-cert.gov/cas/techalerts/TA06-220A.html http://www.vupen.com/english • CWE-20: Improper Input Validation •
CVE-2006-3227
https://notcve.org/view.php?id=CVE-2006-3227
Interpretation conflict between Internet Explorer and other web browsers such as Mozilla, Opera, and Firefox might allow remote attackers to modify the visual presentation of web pages and possibly bypass protection mechanisms such as content filters via ASCII characters with the 8th bit set, which could be stripped by Internet Explorer to render legible text, but not when using other browsers. NOTE: there has been significant discussion about this issue, and as of 20060625, it is not clear where the responsibility for this issue lies, although it might be due to vagueness within the associated standards. NOTE: this might only be exploitable with certain encodings. Conflictos de interpretación entre Internet Explorer y otros buscadores web como Mozilla, Opera, y Firefox pued e permitir a atacantes remotos modificar la presentación de las páginas web y probablemente superar los mecanismos de protección como los filtros e contenido a través de caracteres ASCII con el octavo bit configurado, lo que puede ser desecho por Internet Explorer para traducir texto legible, pero no cuando es usado en otros buscaodres. NOTA: ha habido discursión significativa sobre este tema, como 20060625, no está claro donde se encuentra la responsabilidad de este problema, aunque podría ser debido a la vaguedad dentro de los estándares asociados. • http://ha.ckers.org/blog/20060621/malformed-ascii-bypasses-filters http://ha.ckers.org/blog/20060621/us-ascii-xss-part-2 http://www.osvdb.org/28376 http://www.securityfocus.com/archive/1/437948/100/0/threaded http://www.securityfocus.com/archive/1/438049/100/0/threaded http://www.securityfocus.com/archive/1/438051/100/0/threaded http://www.securityfocus.com/archive/1/438066/100/0/threaded http://www.securityfocus.com/archive/1/438154/100/0/threaded http://www •
CVE-2006-3200
https://notcve.org/view.php?id=CVE-2006-3200
Unspecified versions of Internet Explorer allow remote attackers to cause a denial of service (crash) via an IFRAME with a src tag containing a "File://" URI followed by an 8-bit character. NOTE: some third parties were unable to verify this issue. Versión no especificada de Internet Explorer permite a atacantes remotos causar una denegación de servicio (caída) a través de un IFRAME con una etiqueta src que contiene "File://" seguido por un caracter de 8 bits. NOTA: algunos de estos detalles han sido obtenidos de terceras partes. • http://archives.neohapsis.com/archives/bugtraq/2006-06/0074.html http://securityreason.com/securityalert/1132 http://www.securityfocus.com/archive/1/436839/100/200/threaded http://www.securityfocus.com/archive/1/436889/100/200/threaded •