Executive Summary

Informations
Name MS05-054 First vendor Publication N/A
Vendor Microsoft Last vendor Modification N/A
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 7.5 Attack Range Network
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cumulative Security Update for Internet Explorer (905915)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-399 Resource Management Errors

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:1091
 
Oval ID: oval:org.mitre.oval:def:1091
Title: Server 2003 IE Mismatched Document Object Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1790
Version: 8
Platform(s): Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1097
 
Oval ID: oval:org.mitre.oval:def:1097
Title: Win2K/XP,SP1 HTTPS Proxy Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6, when using an HTTPS proxy server that requires Basic Authentication, sends URLs in cleartext, which allows remote attackers to obtain sensitive information, aka "HTTPS Proxy Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2830
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1101
 
Oval ID: oval:org.mitre.oval:def:1101
Title: WinXP,SP1 (64-bit) HTTPS Proxy Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6, when using an HTTPS proxy server that requires Basic Authentication, sends URLs in cleartext, which allows remote attackers to obtain sensitive information, aka "HTTPS Proxy Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2830
Version: 7
Platform(s): Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1143
 
Oval ID: oval:org.mitre.oval:def:1143
Title: Server 2003,SP1 HTTPS Proxy Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6, when using an HTTPS proxy server that requires Basic Authentication, sends URLs in cleartext, which allows remote attackers to obtain sensitive information, aka "HTTPS Proxy Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2830
Version: 7
Platform(s): Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1209
 
Oval ID: oval:org.mitre.oval:def:1209
Title: Server 2003,SP1 File Download Dialog Box Manipulation Vulnerability
Description: Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2829
Version: 7
Platform(s): Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1299
 
Oval ID: oval:org.mitre.oval:def:1299
Title: WinXP,SP2 IE Mismatched Document Object Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1790
Version: 8
Platform(s): Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1303
 
Oval ID: oval:org.mitre.oval:def:1303
Title: WinXP,SP1 (64-bit) IE Mismatched Document Object Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1790
Version: 7
Platform(s): Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1317
 
Oval ID: oval:org.mitre.oval:def:1317
Title: Server 2003 HTTPS Proxy Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6, when using an HTTPS proxy server that requires Basic Authentication, sends URLs in cleartext, which allows remote attackers to obtain sensitive information, aka "HTTPS Proxy Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2830
Version: 7
Platform(s): Microsoft Windows XP
Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1340
 
Oval ID: oval:org.mitre.oval:def:1340
Title: WinXP,SP1 (64-bit) File Download Dialog Box Manipulation Vulnerability
Description: Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2829
Version: 7
Platform(s): Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1426
 
Oval ID: oval:org.mitre.oval:def:1426
Title: WinXP,SP2 COM Object Instantiation Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, aka a variant of the "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2127.
Family: windows Class: vulnerability
Reference(s): CVE-2005-2831
Version: 8
Platform(s): Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1435
 
Oval ID: oval:org.mitre.oval:def:1435
Title: WinXP,SP2 HTTPS Proxy Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6, when using an HTTPS proxy server that requires Basic Authentication, sends URLs in cleartext, which allows remote attackers to obtain sensitive information, aka "HTTPS Proxy Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2830
Version: 8
Platform(s): Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1458
 
Oval ID: oval:org.mitre.oval:def:1458
Title: Server 2003 File Download Dialog Box Manipulation Vulnerability
Description: Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2829
Version: 7
Platform(s): Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1475
 
Oval ID: oval:org.mitre.oval:def:1475
Title: Server 2003 COM Object Instantiation Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, aka a variant of the "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2127.
Family: windows Class: vulnerability
Reference(s): CVE-2005-2831
Version: 7
Platform(s): Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1489
 
Oval ID: oval:org.mitre.oval:def:1489
Title: Win2k,SP4 IE Mismatched Document Object Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1790
Version: 8
Platform(s): Microsoft Windows 2000
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1490
 
Oval ID: oval:org.mitre.oval:def:1490
Title: Win2K,SP4 File Download Dialog Box Manipulation Vulnerability
Description: Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2829
Version: 8
Platform(s): Microsoft Windows 2000
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1505
 
Oval ID: oval:org.mitre.oval:def:1505
Title: Win2K/XP,SP1 File Download Dialog Box Manipulation Vulnerability
Description: Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2829
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1507
 
Oval ID: oval:org.mitre.oval:def:1507
Title: WinXP,SP2 File Download Dialog Box Manipulation Vulnerability
Description: Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2829
Version: 8
Platform(s): Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1508
 
Oval ID: oval:org.mitre.oval:def:1508
Title: Server 2003,SP1 IE Mismatched Document Object Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1790
Version: 8
Platform(s): Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1520
 
Oval ID: oval:org.mitre.oval:def:1520
Title: WinXP,SP1 (64-bit) COM Object Instantiation Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, aka a variant of the "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2127.
Family: windows Class: vulnerability
Reference(s): CVE-2005-2831
Version: 7
Platform(s): Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1521
 
Oval ID: oval:org.mitre.oval:def:1521
Title: Win2K,SP4 HTTPS Proxy Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6, when using an HTTPS proxy server that requires Basic Authentication, sends URLs in cleartext, which allows remote attackers to obtain sensitive information, aka "HTTPS Proxy Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-2830
Version: 8
Platform(s): Microsoft Windows 2000
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1543
 
Oval ID: oval:org.mitre.oval:def:1543
Title: Server 2003,SP1 COM Object Instantiation Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, aka a variant of the "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2127.
Family: windows Class: vulnerability
Reference(s): CVE-2005-2831
Version: 7
Platform(s): Microsoft Windows Server 2003
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1558
 
Oval ID: oval:org.mitre.oval:def:1558
Title: Win2K,SP4 COM Object Instantiation Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, aka a variant of the "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2127.
Family: windows Class: vulnerability
Reference(s): CVE-2005-2831
Version: 8
Platform(s): Microsoft Windows 2000
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:1597
 
Oval ID: oval:org.mitre.oval:def:1597
Title: Win2K/XP,SP1 COM Object Instantiation Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, aka a variant of the "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2127.
Family: windows Class: vulnerability
Reference(s): CVE-2005-2831
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:722
 
Oval ID: oval:org.mitre.oval:def:722
Title: Win2K/XP,SP1 IE Mismatched Document Object Memory Corruption Vulnerability
Description: Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."
Family: windows Class: vulnerability
Reference(s): CVE-2005-1790
Version: 7
Platform(s): Microsoft Windows 2000
Microsoft Windows XP
Product(s): Microsoft Internet Explorer
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 3
Application 13

SAINT Exploits

Description Link
Internet Explorer onload window vulnerability More info here

ExploitDB Exploits

id Description
2012-01-14 Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution V...

Open Source Vulnerability Database (OSVDB)

Id Description
23657 Microsoft IE ActiveX Killbit Setting Bypass

Microsoft Internet Explorer contains a flaw that may allow a malicious user to bypass the kill bit settings for ActiveX controls. The issue is triggered when user visits a malicious web page that contains specially crafted HTML which would cause the killbit setting for ActiveX controls to be bypassed. It is possible that the flaw may allow to execute arbitary code with user privileges.
21763 Microsoft IE Embedded CLSID COM Object Arbitrary Code Execution

Microsoft Internet Explorer contains a flaw that may allow a malicious user to corrupt memory. The issue is triggered when the user accesses a maliciously crafted web page that instantiates COM objects which were not intended for use with IE, as ActiveX controls. It is possible that the flaw may allow for arbitrary code execution resulting in a loss of integrity.
21762 Microsoft IE HTTPS Proxy Basic Authentication URL Cleartext Transmission

21761 Microsoft IE Keyboard Shortcut Processing Weakness

21760 Microsoft IE Suppressed Download Dialog Window Manipulation Weakness

17094 Microsoft IE window() Function Arbitrary Code Execution

Internet Explorer contains a flaw that may allow a remote attacker to execute arbitrary commands. The issue occurs when the browser does not properly handle requests to the window() object. A remote attacker could create a malicious website that uses an onload event to initialize a window() object, which may cause Internet Explorer to crash or execute arbitrary code with the privileges of the person running it.

Snort® IPS/IDS

Date Description
2014-01-10 Microsoft Internet Explorer javascript onload prompt obfuscation overflow att...
RuleID : 4917 - Revision : 16 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer javascript onload document.write obfuscation over...
RuleID : 4916 - Revision : 15 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer Shortcut Handler ActiveX object access
RuleID : 4915 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Script Definition ActiveX object access
RuleID : 4914 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Workspace ActiveX object access
RuleID : 4913 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Root ActiveX object access
RuleID : 4912 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Type Library ActiveX object access
RuleID : 4911 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Relationship Definition ActiveX object...
RuleID : 4910 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Property Definition ActiveX object access
RuleID : 4909 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Method Definition ActiveX object access
RuleID : 4908 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Collection Definition ActiveX object a...
RuleID : 4907 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Interface Definition ActiveX object ac...
RuleID : 4906 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Object ActiveX object access
RuleID : 4905 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Repository Alias ActiveX object access
RuleID : 4904 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer VMR ImageSync 9 ActiveX object access
RuleID : 4903 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Video Mixing Renderer 9 ActiveX object access
RuleID : 4902 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer VMR Allocator Presenter 9 ActiveX object access
RuleID : 4901 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Outlook Progress Ctl ActiveX object access
RuleID : 4900 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer ISupportErrorInfo Interface ActiveX object access
RuleID : 4899 - Revision : 17 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer PSTypeComp ActiveX object access
RuleID : 4898 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer PSOAInterface ActiveX object access
RuleID : 4897 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer PSTypeLib ActiveX object access
RuleID : 4896 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer PSTypeInfo ActiveX object access
RuleID : 4895 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer PSEnumVariant ActiveX object access
RuleID : 4894 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer Trident HTMLEditor ActiveX object access
RuleID : 4893 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer MTSEvents Class ActiveX object access
RuleID : 4892 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer cfw Class ActiveX object access
RuleID : 4891 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer IAVIStream & IAVIFile Proxy ActiveX object ac...
RuleID : 4890 - Revision : 14 - Type : BROWSER-PLUGINS
2014-01-10 Microsoft Internet Explorer javascript onload overflow attempt
RuleID : 4647 - Revision : 17 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer File Download Dialog Box Manipulation
RuleID : 17463 - Revision : 13 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer HTTPS proxy information disclosure vulnerability
RuleID : 17448 - Revision : 11 - Type : BROWSER-IE
2014-01-10 Microsoft Internet Explorer Address ActiveX clsid access
RuleID : 11252 - Revision : 13 - Type : BROWSER-PLUGINS
2014-01-10 Sony Rootkit Uninstaller ActiveX clsid unicode access
RuleID : 11251 - Revision : 6 - Type : WEB-ACTIVEX
2014-01-10 Sony Rootkit Uninstaller ActiveX clsid access
RuleID : 11250 - Revision : 12 - Type : BROWSER-PLUGINS
2014-01-10 IE Address ActiveX clsid unicode access
RuleID : 11249 - Revision : 7 - Type : WEB-ACTIVEX

Metasploit Database

id Description
2005-11-21 MS05-054 Microsoft Internet Explorer JavaScript OnLoad Handler Remote Code Execution

Nessus® Vulnerability Scanner

Date Description
2006-02-14 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms06-004.nasl - Type : ACT_GATHER_INFO
2005-12-13 Name : Arbitrary code can be executed on the remote host through the web client.
File : smb_nt_ms05-054.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2020-05-23 13:17:12
  • Multiple Updates
2014-02-17 11:45:17
  • Multiple Updates
2014-01-19 21:29:57
  • Multiple Updates