Page 89 of 625 results (0.008 seconds)

CVSS: 5.0EPSS: 96%CPEs: 4EXPL: 2

Stack overflow in Microsoft Internet Explorer 6 on Windows 2000 allows remote attackers to cause a denial of service (application crash) by creating an NMSA.ASFSourceMediaDescription.1 ActiveX object with a long dispValue property. Desbordamiento de búfer basado en pila en Microsoft Internet Explorer 6 sobre Windows 2000 permite a atacantes remotos provocar denegación de servicio (caida de aplicación) a través de la creación de un objeto ActiveX NMSA.ASFSourceMediaDescription.1 con una propiedad dispValue. • https://www.exploit-db.com/exploits/28259 http://browserfun.blogspot.com/2006/07/mobb-23-nmsaasfsourcemediadescription.html http://www.osvdb.org/27232 http://www.securityfocus.com/bid/19114 http://www.vupen.com/english/advisories/2006/2953 https://exchange.xforce.ibmcloud.com/vulnerabilities/27930 • CWE-787: Out-of-bounds Write •

CVSS: 5.0EPSS: 83%CPEs: 3EXPL: 2

Microsoft Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to cause a denial of service (application crash) by calling the Click method of the Internet.HHCtrl.1 ActiveX object before initializing the URL, which triggers a null dereference. Microsoft Internet Explorer 6.0 sobre Windows XP SP2 permite a atacantes remotos provocar denegación de servicio (caida de aplicación) a través de la llamada al método click del objeto ActiveX Internet.HHCtrl.1 anterior a la inicialización de la URL, la cual dispara un referencia a un NULL. • https://www.exploit-db.com/exploits/28256 http://browserfun.blogspot.com/2006/07/mobb-22-internethhctrl-click.html http://www.osvdb.org/27231 http://www.securityfocus.com/bid/19109 http://www.vupen.com/english/advisories/2006/2952 https://exchange.xforce.ibmcloud.com/vulnerabilities/27929 •

CVSS: 5.0EPSS: 52%CPEs: 4EXPL: 2

Microsoft Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to cause a denial of service (application crash) by calling the stringToBinary function of the CEnroll.CEnroll.2 ActiveX object with a long second argument, which triggers an invalid memory access inside the SysAllocStringLen function. Microsoft Internet Explorer 6.0 en Windows XP SP2 permite a atacantes remotos provocar una denegación de servicio (cierre de aplicación) llamando a la función stringToBinary del objeto ActiveX CEnroll.CEnroll.2 con un segundo argumento largo, lo cual dispara un acceso a memoria inválido dentro de la función SysAllocStringLen. • https://www.exploit-db.com/exploits/28252 http://browserfun.blogspot.com/2006/07/mobb-21-cenroll-stringtobinary.html http://www.osvdb.org/27230 http://www.securityfocus.com/bid/19102 http://www.vupen.com/english/advisories/2006/2916 https://exchange.xforce.ibmcloud.com/vulnerabilities/27884 •

CVSS: 2.6EPSS: 5%CPEs: 4EXPL: 3

DataSourceControl in Internet Explorer 6 on Windows XP SP2 with Office installed allows remote attackers to cause a denial of service (crash) via a large negative integer argument to the getDataMemberName method of a OWC11.DataSourceControl.11 object, which leads to an integer overflow and a null dereference. DataSourceControl en Internet Explorer 6 sobre Windows XP SP2 con Office instalado permite a atacantes remotos provocar denegación de servicio (caida) a través de un argumento entero largo negativo en el método getDataMemberName de un objeto OWC11.DataSourceControl.11, el cual lleva a un desbordamiento de entero y una referencia NULL. • https://www.exploit-db.com/exploits/28244 http://browserfun.blogspot.com/2006/07/mobb-19-datasourcecontrol.html http://www.osvdb.org/27111 http://www.securityfocus.com/bid/19069 http://www.vupen.com/english/advisories/2006/2883 https://exchange.xforce.ibmcloud.com/vulnerabilities/27803 •

CVSS: 9.3EPSS: 97%CPEs: 3EXPL: 7

Integer overflow in Microsoft Internet Explorer 6 on Windows XP SP2 allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a 0x7fffffff argument to the setSlice method on a WebViewFolderIcon ActiveX object, which leads to an invalid memory copy. Desbordamiento de entero en Microsoft Internet Explorer 6 sobre Windows XP SP2 permite a atacantes remotos provocar denegación de servicio (caida) y ejecutar código de su elección a través deun argumento 0x7fffffff en el método setSlice sobre un objeto ActiveX WebViewFolderIcon, el cual dará lugar a una copia de memoria no válida. • https://www.exploit-db.com/exploits/2458 https://www.exploit-db.com/exploits/2460 https://www.exploit-db.com/exploits/2448 https://www.exploit-db.com/exploits/2440 https://www.exploit-db.com/exploits/16564 http://browserfun.blogspot.com/2006/07/mobb-18-webviewfoldericon-setslice.html http://isc.sans.org/diary.php?storyid=1742 http://riosec.com/msie-setslice-vuln http://secunia.com/advisories/22159 http://securitytracker.com/id?1016941 http://www.kb.cert.org/vuls/ • CWE-94: Improper Control of Generation of Code ('Code Injection') •