CVE-2006-3658
https://notcve.org/view.php?id=CVE-2006-3658
Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by accessing the object references of a FolderItem ActiveX object, which triggers a null dereference in the security check. Microsoft Internet Explorer 6 permite a atacantes remotos provocar denegación de servicio (caida) a través del acceso a referencia a objeto de un objeto Active X FolderItem, el cual dispara un referencia null en la validación de seguridad. • http://browserfun.blogspot.com/2006/07/mobb-15-folderitem-access.html http://www.osvdb.org/27059 http://www.vupen.com/english/advisories/2006/2814 https://exchange.xforce.ibmcloud.com/vulnerabilities/27760 •
CVE-2006-3659
https://notcve.org/view.php?id=CVE-2006-3659
Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by setting the location or URL property of a MHTMLFile ActiveX object. Microsoft Internet Explorer 6 Microsoft Internet Explorer 6 permite a atacantes remotos provocar una denegación de servicio (caída) estableciendo la propiedad location o URL del objeto ActiveX MHTMLFile. • http://browserfun.blogspot.com/2006/07/mobb-16-mhtmlfile-location.html http://www.osvdb.org/27108 http://www.securityfocus.com/bid/19013 http://www.vupen.com/english/advisories/2006/2831 https://exchange.xforce.ibmcloud.com/vulnerabilities/27761 •
CVE-2006-3591 – Microsoft Internet Explorer 6 - TriEditDocument Denial of Service
https://notcve.org/view.php?id=CVE-2006-3591
Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (application crash) by accessing the URL property of a TriEditDocument.TriEditDocument object before it has been initialized, which triggers a NULL pointer dereference. Microsoft Internet Explorer 6 permite a atacantes remotos provocar denegación de servicio (Caida de aplicación) a través del acceso la propiedad URL de un objeto TriEditDocument.TriEditDocument anterior que ha sido inicializado, el cual dispara una referencia a un puntero NULL. • https://www.exploit-db.com/exploits/28207 http://browserfun.blogspot.com/2006/07/mobb-12-trieditdocument-url.html http://www.osvdb.org/27056 http://www.securityfocus.com/bid/18946 http://www.vupen.com/english/advisories/2006/2765 https://exchange.xforce.ibmcloud.com/vulnerabilities/27675 •
CVE-2006-3605 – Microsoft Internet Explorer 6 - RevealTrans Denial of Service
https://notcve.org/view.php?id=CVE-2006-3605
Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by setting the Transition property on an uninitialized DXImageTransform.Microsoft.RevealTrans.1 ActiveX Object, which triggers a null dereference. Microsoft Internet Explorer 6 permite a atacantes remotos provocar una denegación de servicio (caída) estableciendo la propiedad Transition en un objeto ActiveX DXImageTransform.Microsoft.RevealTrans.1, lo cual provoca una referencia nula. • https://www.exploit-db.com/exploits/28213 http://browserfun.blogspot.com/2006/07/mobb-13-revealtrans-transition.html http://www.osvdb.org/27057 http://www.securityfocus.com/bid/18960 http://www.vupen.com/english/advisories/2006/2793 https://exchange.xforce.ibmcloud.com/vulnerabilities/27713 •
CVE-2006-3513 – Microsoft Internet Explorer 6 - DirectAnimation.DAUserData Denial of Service
https://notcve.org/view.php?id=CVE-2006-3513
danim.dll in Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (application crash) by accessing the Data property of a DirectAnimation DAUserData object before it is initialized, which triggers a NULL pointer dereference. danim.dll de Microsoft Internet Explorer 6 permite a atacantes remotos provocar una denegación de servicio (caída de aplicación) por acceder a los datos de propiedad de un objeto DirectAnimation DAUserData antes de que sea inicializado, lo cual dispara un puntero a referencia NULL. • https://www.exploit-db.com/exploits/28196 http://browserfun.blogspot.com/2006/07/mobb-9-directanimationdauserdata-data.html http://www.osvdb.org/27013 http://www.securityfocus.com/bid/18902 http://www.vupen.com/english/advisories/2006/2719 https://exchange.xforce.ibmcloud.com/vulnerabilities/27622 •