Page 86 of 625 results (0.011 seconds)

CVSS: 9.3EPSS: 82%CPEs: 2EXPL: 0

Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using JavaScript to cause certain errors simultaneously, which results in the access of previously freed memory, aka "Script Error Handling Memory Corruption Vulnerability." Microsoft Internet Explorer 6 permite a atacantes remotos ejecutar código de su elección utilizando JavaScript para provocar determinados errores simultáneamente, lo cual resulta en un acceso a memoria previamente liberada, también conocida como "Vulnerabilidad de corrupción de memoria en el manejo de errores". • http://secunia.com/advisories/20807 http://secunia.com/secunia_research/2006-58/advisory http://securitytracker.com/id?1017373 http://www.kb.cert.org/vuls/id/599832 http://www.osvdb.org/30813 http://www.securityfocus.com/archive/1/454205/100/0/threaded http://www.securityfocus.com/archive/1/454969/100/200/threaded http://www.securityfocus.com/bid/21552 http://www.us-cert.gov/cas/techalerts/TA06-346A.html http://www.vupen.com/english/advisories/2006/4966 https:& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 89%CPEs: 1EXPL: 0

Unspecified vulnerability in Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code via certain DHTML script functions, such as normalize, and "incorrectly created elements" that trigger memory corruption, aka "DHTML Script Function Memory Corruption Vulnerability." Vulnerabilidad sin especificar en el Microsoft Internet Explorer 6 permite a atacantes remotos ejecutar código de su elección a través de determinadas funciones DHTML , como la "normalize", y "elementos creados incorrectamente" que disparan una corrupción de memoria, también conocido como "Vulnerabilidad de corrupción de memoria mediante una función DHTML". This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific vulnerability exists due to improper handling of the normalize() function. When called in certain circumstances user controllable memory can be used to execute arbitrary code. • http://secunia.com/advisories/23288 http://securitytracker.com/id?1017373 http://www.kb.cert.org/vuls/id/347448 http://www.osvdb.org/30814 http://www.securityfocus.com/archive/1/454210/100/0/threaded http://www.securityfocus.com/archive/1/454969/100/200/threaded http://www.securityfocus.com/bid/21546 http://www.symantec.com/security_response/writeup.jsp?docid=2006-121212-1201-99 http://www.us-cert.gov/cas/techalerts/TA06-346A.html http://www.vupen.com/english/ •

CVSS: 5.0EPSS: 12%CPEs: 2EXPL: 3

Microsoft Internet Explorer 6.0 SP1 and earlier allows remote attackers to cause a denial of service (crash) via an invalid src attribute value ("?") in an HTML frame tag that is in a frameset tag with a large rows attribute. NOTE: The provenance of this information is unknown; the details are obtained solely from third party information. Microsoft Internet Explorer 6.0 SP1 y anteriores permiten a atacantes remotos provocar una denegación de servicio (caída) mediante un valor del atributo src inválido ("?") en una etiqueta frame de HTML que se encuentra dentro de una etiqueta frameset con un atriburo rows grande. • https://www.exploit-db.com/exploits/29229 http://downloads.securityfocus.com/vulnerabilities/exploits/21447.html http://www.osvdb.org/31325 http://www.securityfocus.com/bid/21447 •

CVSS: 7.5EPSS: 3%CPEs: 6EXPL: 0

Multiple unspecified vulnerabilities in DirectAnimation ActiveX controls for Microsoft Internet Explorer 5.01 through 6 have unknown impact and remote attack vectors, possibly related to (1) Danim.dll and (2) Lmrt.dll, a different set of vulnerabilities than CVE-2006-4446 and CVE-2006-4777. Múltiples vulnerabilidades no especificadas en controles ActiveX DirectAnimation para Microsoft Internet Explorer 5.01 hasta 6 tiene impacto y vectores desconocidos, posiblemente relacionados con (1) Danim.dll y (2) Lmrt.dll, un conjunto diferente de vulnerabilidades que CVE-2006-4446 y CVE-2006-4777. • http://www.osvdb.org/31324 http://www.us-cert.gov/cas/techalerts/TA06-318A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 •

CVSS: 5.1EPSS: 57%CPEs: 6EXPL: 0

Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via crafted layout combinations involving DIV tags and HTML CSS float properties that trigger memory corruption, aka "HTML Rendering Memory Corruption Vulnerability." Microsoft Internet Explorer 5.01 hasta 6 permite a atacantes remotos ejecutar código de su elección mediante combinaciones de diseño artesanales implicando etiquetas DIV y propiedades float de HTML CSS que disparan una corrupción de memoria, también conocido como "Vulnerabilidad de corrupción de memoria al traducir HTML". This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific vulnerability exists due to improper parsing of HTML CSS 'float' properties. By ordering specially crafted 'div' tags in a web page, memory corruption can occur leading to remote code execution. • http://securitytracker.com/id?1017223 http://www.kb.cert.org/vuls/id/197852 http://www.osvdb.org/31323 http://www.securityfocus.com/archive/1/451590/100/100/threaded http://www.securityfocus.com/bid/21020 http://www.us-cert.gov/cas/techalerts/TA06-318A.html http://www.vupen.com/english/advisories/2006/4505 http://www.zerodayinitiative.com/advisories/ZDI-06-041.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-067 https://exchange.xforce • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •