Page 89 of 715 results (0.007 seconds)

CVSS: 5.1EPSS: 96%CPEs: 2EXPL: 1

Microsoft Internet Explorer 5.01 SP4 and 6 does not properly handle various HTML layout component combinations, which allows user-assisted remote attackers to execute arbitrary code via a crafted HTML file that leads to memory corruption, aka "HTML Rendering Memory Corruption Vulnerability." Microsoft Internet Explorer 5.01 SP4 y 6 no maneja adecuadamente diversas combinaciones de componentes en diseños HTML, lo cual permite a atacantes remotos con la intervención del usuario ejecutar código de su elección mediante un archivo HTML manipulado que lleva a una corrupción de memoria, también conocido como "Vulnerabilidad de Corrupción de Memoria en Renderizado HTML" • https://www.exploit-db.com/exploits/27971 http://secunia.com/advisories/21396 http://securitytracker.com/id?1016663 http://www.kb.cert.org/vuls/id/340060 http://www.osvdb.org/27853 http://www.us-cert.gov/cas/techalerts/TA06-220A.html http://www.vupen.com/english/advisories/2006/3212 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-042 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A502 •

CVSS: 7.5EPSS: 69%CPEs: 2EXPL: 0

Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using the document.getElementByID Javascript function to access crafted Cascading Style Sheet (CSS) elements, and possibly other unspecified vectors involving certain layout positioning combinations in an HTML file. Microsoft Internet Explorer 6 permite a atacantes remotos ejecutar código de su elección usando la función Javascript document.getElementByID para acceder a elementos de Hojas de Estilo en Cascada (CSS) manipulados, y posiblemente otros vectores no especificados relacionados con determinadas combinaciones de posicionamiento en el diseño de un archivo HTML. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page. The specific vulnerability exists due to improper handling of CSS class values. Accessing a specially crafted CSS element via document.getElementByID causes a memory corruption eventually leading to code execution. • http://secunia.com/advisories/21396 http://securitytracker.com/id?1016663 http://www.kb.cert.org/vuls/id/119180 http://www.osvdb.org/27855 http://www.securityfocus.com/archive/1/442579/100/0/threaded http://www.securityfocus.com/bid/19312 http://www.us-cert.gov/cas/techalerts/TA06-220A.html http://www.vupen.com/english/advisories/2006/3212 http://www.zerodayinitiative.com/advisories/ZDI-06-027.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/20 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 92%CPEs: 4EXPL: 3

Microsoft Internet Explorer 6 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) by iterating over any native function, as demonstrated with the window.alert function, which triggers a null dereference. Microsoft Internet Explorer 6 sobre Windows XP SP2 permite a atacantes remotos provocar denegación de servicio (caida) a travès de la iteración sobre cualquier función nativa, como se demostro con la función window.alert, lo cual dispara un referencia null. • https://www.exploit-db.com/exploits/28265 http://browserfun.blogspot.com/2006/07/mobb-25-native-function-iterator.html http://www.osvdb.org/27373 http://www.securityfocus.com/bid/19140 http://www.vupen.com/english/advisories/2006/2955 https://exchange.xforce.ibmcloud.com/vulnerabilities/27932 •

CVSS: 5.0EPSS: 96%CPEs: 4EXPL: 2

Stack overflow in Microsoft Internet Explorer 6 on Windows 2000 allows remote attackers to cause a denial of service (application crash) by creating an NMSA.ASFSourceMediaDescription.1 ActiveX object with a long dispValue property. Desbordamiento de búfer basado en pila en Microsoft Internet Explorer 6 sobre Windows 2000 permite a atacantes remotos provocar denegación de servicio (caida de aplicación) a través de la creación de un objeto ActiveX NMSA.ASFSourceMediaDescription.1 con una propiedad dispValue. • https://www.exploit-db.com/exploits/28259 http://browserfun.blogspot.com/2006/07/mobb-23-nmsaasfsourcemediadescription.html http://www.osvdb.org/27232 http://www.securityfocus.com/bid/19114 http://www.vupen.com/english/advisories/2006/2953 https://exchange.xforce.ibmcloud.com/vulnerabilities/27930 • CWE-787: Out-of-bounds Write •

CVSS: 5.0EPSS: 83%CPEs: 3EXPL: 2

Microsoft Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to cause a denial of service (application crash) by calling the Click method of the Internet.HHCtrl.1 ActiveX object before initializing the URL, which triggers a null dereference. Microsoft Internet Explorer 6.0 sobre Windows XP SP2 permite a atacantes remotos provocar denegación de servicio (caida de aplicación) a través de la llamada al método click del objeto ActiveX Internet.HHCtrl.1 anterior a la inicialización de la URL, la cual dispara un referencia a un NULL. • https://www.exploit-db.com/exploits/28256 http://browserfun.blogspot.com/2006/07/mobb-22-internethhctrl-click.html http://www.osvdb.org/27231 http://www.securityfocus.com/bid/19109 http://www.vupen.com/english/advisories/2006/2952 https://exchange.xforce.ibmcloud.com/vulnerabilities/27929 •