Executive Summary
Informations | |||
---|---|---|---|
Name | MS06-042 | First vendor Publication | N/A |
Vendor | Microsoft | Last vendor Modification | N/A |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cumulative Security Update for Internet Explorer (918899) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-20 | Improper Input Validation |
25 % | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
25 % | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:171 | |||
Oval ID: | oval:org.mitre.oval:def:171 | ||
Title: | Window Location Information Disclosure Vulnerability | ||
Description: | Microsoft Internet Explorer 5.01 and 6 allows certain script to persist across navigations between pages, which allows remote attackers to obtain the window location of visited web pages in other domains or zones, aka "Window Location Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-3640 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:433 | |||
Oval ID: | oval:org.mitre.oval:def:433 | ||
Title: | HTML Layout and Positioning Memory Corruption Vulnerability | ||
Description: | Microsoft Internet Explorer 6 allows remote attackers to execute arbitrary code by using the document.getElementByID Javascript function to access crafted Cascading Style Sheet (CSS) elements, and possibly other unspecified vectors involving certain layout positioning combinations in an HTML file. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-3450 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:462 | |||
Oval ID: | oval:org.mitre.oval:def:462 | ||
Title: | FTP Server Command Injection Vulnerability | ||
Description: | CRLF injection vulnerability in Microsoft Internet Explorer 6.0.2800.1106 and earlier allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2004-1166 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:5 | |||
Oval ID: | oval:org.mitre.oval:def:5 | ||
Title: | CSS Memory Corruption Vulnerability | ||
Description: | Microsoft Internet Explorer 5 SP4 and 6 do not properly garbage collect when "multiple imports are used on a styleSheets collection" to construct a chain of Cascading Style Sheets (CSS), which allows remote attackers to execute arbitrary code via unspecified vectors. | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-3451 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:502 | |||
Oval ID: | oval:org.mitre.oval:def:502 | ||
Title: | HTML Rendering Memory Corruption Vulnerability | ||
Description: | Microsoft Internet Explorer 5.01 SP4 and 6 does not properly handle various HTML layout component combinations, which allows user-assisted remote attackers to execute arbitrary code via a crafted HTML file that leads to memory corruption, aka "HTML Rendering Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-3637 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:577 | |||
Oval ID: | oval:org.mitre.oval:def:577 | ||
Title: | Source Element Cross-Domain Vulnerability | ||
Description: | Microsoft Internet Explorer 5.01 and 6 does not properly identify the originating domain zone when handling redirects, which allows remote attackers to read cross-domain web pages and possibly execute code via unspecified vectors involving a crafted web page, aka "Source Element Cross-Domain Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-3639 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:719 | |||
Oval ID: | oval:org.mitre.oval:def:719 | ||
Title: | COM Object Instantiation Memory Corruption Vulnerability | ||
Description: | Microsoft Internet Explorer 5.01 and 6 does not properly handle uninitialized COM objects, which allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code, as demonstrated by the Nth function in the DirectAnimation.DATuple ActiveX control, aka "COM Object Instantiation Memory Corruption Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-3638 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:738 | |||
Oval ID: | oval:org.mitre.oval:def:738 | ||
Title: | Redirect Cross-Domain Information Disclosure Vulnerability | ||
Description: | Cross-domain vulnerability in Microsoft Internet Explorer 6.0 allows remote attackers to access restricted information from other domains via an object tag with a data parameter that references a link on the attacker's originating site that specifies a Location HTTP header that references the target site, which then makes that content available through the outerHTML attribute of the object, aka "Redirect Cross-Domain Information Disclosure Vulnerability." | ||
Family: | windows | Class: | vulnerability |
Reference(s): | CVE-2006-3280 | Version: | 10 |
Platform(s): | Microsoft Windows 2000 Microsoft Windows XP Microsoft Windows Server 2003 | Product(s): | Microsoft Internet Explorer |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
30834 | Microsoft IE URLMON.DLL Long URL HTTP Redirect Overflow A remote buffer overflow exists in URLMON.DLL of Microsoft Internet Explorer. The browser fails to check the bounds on long URLs when using the HTTP 1.1 protocol and GZip compression resulting in a heap-based buffer overflow. With a specially crafted request, an attacker can cause execution of arbitrary code resulting in a loss of integrity. |
28132 | Microsoft IE HTTP 1.1 URL Parsing Overflow A remote overflow exists in Microsoft's Internet Explorer. Internet Explorer fails to correctly handle a long URL using HTTP 1.1 compression resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. |
27855 | Microsoft IE document.getElementByID Crafted CSS Arbitrary Code Execution Microsoft Internet Explorer contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when a user accesses a malicious web site that contains JavaScript. It is possible that the flaw may allow to execute arbitrary code resulting in a loss of integrity. |
27854 | Microsoft IE Chained CSS Imports Memory Corruption Microsoft Internet Explorer contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when a user visits a malicious web page that contains chained cascading style sheets (CSS). It is possible that the flaw may allow to execute arbitrary code resulting in a loss of integrity. |
27853 | Microsoft IE HTML Rendering Memory Corruption Microsoft Internet Explorer contains a flaw that may allow a malicious user to execute arbitrary code. The issue is triggered when a user visits a specially crafted web site that contains plain HTML. It is possible that the flaw may allow arbitrary code execution resulting in a loss of integrity. |
27852 | Microsoft IE Uninitialized COM Object Memory Corruption Microsoft Internet Explorer contains a flaw that may allow a malicious user to execute code on a user's machine. The issue is triggered when user accesses a malicious web page that contains instructions to instantiate an activeX control. It is possible that the flaw may allow execute code resulting in a loss of integrity. |
27851 | Microsoft IE Redirect Handling Cross-Domain Privilege Escalation Microsoft Internet Explorer contains a flaw that may allow a malicious user to read cross-domain web pages and possibly execute code via unspecified vectors involving a specially crafted web page. It is possible that the flaw may allow execution of code resulting in a loss of integrity. |
27850 | Microsoft IE Cross Site Window Location Information Disclosure Microsoft Internet Explorer contains a flaw that may lead to an unauthorized information disclosure. Â The issue is triggered when a user accesses a web page that contains a malicious script that persists across navigation between pages, which will disclose window location of visited web pages in other domains resulting in a loss of confidentiality. |
26956 | Microsoft IE object.documentElement.outerHTML Cross-site Information Disclosure |
12299 | Microsoft IE FTP URL Arbitrary Command Injection Internet Explorer contains a flaw that will allow an attacker to inject arbitrary FTP commands. The problem is that the Internet Explorer URL FTP request is not verified properly and will allow an attacker to inject or manipulate FTP commands, resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | DXImageTransform.Microsoft.NDFXArtEffects ActiveX function call access RuleID : 8425 - Revision : 13 - Type : BROWSER-PLUGINS |
2014-01-10 | DXImageTransform.Microsoft.NDFXArtEffects ActiveX CLSID unicode access RuleID : 7915 - Revision : 7 - Type : WEB-ACTIVEX |
2014-01-10 | DXImageTransform.Microsoft.NDFXArtEffects ActiveX clsid access RuleID : 7914 - Revision : 13 - Type : BROWSER-PLUGINS |
2014-01-10 | WM VIH2 Fix ActiveX CLSID unicode access RuleID : 7501 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WM VIH2 Fix ActiveX clsid access RuleID : 7500 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WM TV Out Smooth Picture Filter ActiveX CLSID unicode access RuleID : 7499 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WM TV Out Smooth Picture Filter ActiveX clsid access RuleID : 7498 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Volume ActiveX CLSID unicode access RuleID : 7497 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Volume ActiveX clsid access RuleID : 7496 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Virtual Source ActiveX CLSID unicode access RuleID : 7495 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Virtual Source ActiveX clsid access RuleID : 7494 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Virtual Renderer ActiveX CLSID unicode access RuleID : 7493 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Virtual Renderer ActiveX clsid access RuleID : 7492 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Switch Filter ActiveX CLSID unicode access RuleID : 7491 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Switch Filter ActiveX clsid access RuleID : 7490 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Screen capture Filter ActiveX CLSID unicode access RuleID : 7489 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Screen capture Filter ActiveX clsid access RuleID : 7488 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Screen Capture Filter Task Page ActiveX CLSID unicode access RuleID : 7487 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Screen Capture Filter Task Page ActiveX clsid... RuleID : 7486 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Sample Info Filter ActiveX CLSID unicode access RuleID : 7485 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Sample Info Filter ActiveX clsid access RuleID : 7484 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT MuxDeMux Filter ActiveX CLSID unicode access RuleID : 7483 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT MuxDeMux Filter ActiveX clsid access RuleID : 7482 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Log Filter ActiveX CLSID unicode access RuleID : 7481 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Log Filter ActiveX clsid access RuleID : 7480 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Interlacer ActiveX CLSID unicode access RuleID : 7479 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Interlacer ActiveX clsid access RuleID : 7478 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Import Filter ActiveX CLSID unicode access RuleID : 7477 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Import Filter ActiveX clsid access RuleID : 7476 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT FormatConversion ActiveX CLSID unicode access RuleID : 7475 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT FormatConversion ActiveX clsid access RuleID : 7474 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT FormatConversion Prop Page ActiveX CLSID unicode access RuleID : 7473 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT FormatConversion Prop Page ActiveX clsid access RuleID : 7472 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT DV Extract Filter ActiveX CLSID unicode access RuleID : 7471 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT DV Extract Filter ActiveX clsid access RuleID : 7470 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT DirectX Transform Wrapper ActiveX CLSID unicode access RuleID : 7469 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT DirectX Transform Wrapper ActiveX clsid access RuleID : 7468 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT DeInterlace Prop Page ActiveX CLSID unicode access RuleID : 7467 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT DeInterlace Prop Page ActiveX clsid access RuleID : 7466 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT DeInterlace Filter ActiveX CLSID unicode access RuleID : 7465 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT DeInterlace Filter ActiveX clsid access RuleID : 7464 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Black Frame Generator ActiveX CLSID unicode access RuleID : 7463 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Black Frame Generator ActiveX clsid access RuleID : 7462 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WMT Audio Analyzer ActiveX CLSID unicode access RuleID : 7461 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WMT Audio Analyzer ActiveX clsid access RuleID : 7460 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Wmm2fxb.dll ActiveX CLSID unicode access RuleID : 7459 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer Wmm2fxb.dll ActiveX clsid access RuleID : 7458 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Wmm2fxa.dll ActiveX CLSID unicode access RuleID : 7457 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer Wmm2fxa.dll ActiveX clsid access RuleID : 7456 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Wmm2ae.dll ActiveX CLSID unicode access RuleID : 7455 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer Wmm2ae.dll ActiveX clsid access RuleID : 7454 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | WM Color Converter Filter ActiveX CLSID unicode access RuleID : 7453 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer WM Color Converter Filter ActiveX clsid access RuleID : 7452 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Stetch ActiveX CLSID unicode access RuleID : 7451 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer Stetch ActiveX clsid access RuleID : 7450 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | ShotDetect ActiveX CLSID unicode access RuleID : 7449 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer ShotDetect ActiveX clsid access RuleID : 7448 - Revision : 12 - Type : BROWSER-PLUGINS |
2014-01-10 | Record Queue ActiveX CLSID unicode access RuleID : 7447 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer Record Queue ActiveX clsid access RuleID : 7446 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Mmedia.AsyncMHandler.1 ActiveX CLSID unicode access RuleID : 7445 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer Mmedia.AsyncMHandler.1 ActiveX clsid access RuleID : 7444 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | mmAEPlugIn.AEPlugIn.1 ActiveX CLSID unicode access RuleID : 7443 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer mmAEPlugIn.AEPlugIn.1 ActiveX clsid access RuleID : 7442 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Frame Eater ActiveX CLSID unicode access RuleID : 7438 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer Frame Eater ActiveX clsid access RuleID : 7437 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer Dynamic Casts ActiveX function call RuleID : 7436 - Revision : 16 - Type : BROWSER-PLUGINS |
2014-01-10 | Microsoft Internet Explorer Dynamic Casts ActiveX clsid access RuleID : 7435 - Revision : 19 - Type : BROWSER-PLUGINS |
2014-01-10 | DirectX Transform Wrapper Property Page ActiveX CLSID unicode access RuleID : 7434 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DirectX Transform Wrapper Property Page ActiveX c... RuleID : 7433 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | DirectFrame.DirectControl.1 ActiveX CLSID unicode access RuleID : 7432 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer DirectFrame.DirectControl.1 ActiveX clsid access RuleID : 7431 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Bitmap ActiveX CLSID unicode access RuleID : 7430 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer Bitmap ActiveX clsid access RuleID : 7429 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | Allocator Fix ActiveX CLSID unicode access RuleID : 7428 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer Allocator Fix ActiveX clsid access RuleID : 7427 - Revision : 14 - Type : BROWSER-PLUGINS |
2014-01-10 | 9x8Resize ActiveX CLSID unicode access RuleID : 7426 - Revision : 6 - Type : WEB-ACTIVEX |
2014-01-10 | Microsoft Internet Explorer 9x8Resize ActiveX clsid access RuleID : 7425 - Revision : 14 - Type : BROWSER-PLUGINS |
2016-04-05 | Microsoft Internet Explorer long URL buffer overflow attempt RuleID : 37961 - Revision : 2 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer long URL buffer overflow attempt RuleID : 18517 - Revision : 6 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer frameset memory corruption attempt RuleID : 18307 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer FTP command injection attempt RuleID : 18300 - Revision : 9 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer cross domain information disclosure attempt RuleID : 18194 - Revision : 7 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer cross domain information disclosure attempt RuleID : 18193 - Revision : 8 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer long URL buffer overflow attempt RuleID : 17494 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer cross domain information disclosure attempt RuleID : 16045 - Revision : 10 - Type : BROWSER-IE |
2014-01-10 | Microsoft Internet Explorer compressed content attempt RuleID : 16033 - Revision : 14 - Type : BROWSER-IE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2006-08-08 | Name : Arbitrary code can be executed on the remote host through the web client. File : smb_nt_ms06-042.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:45:27 |
|
2014-01-19 21:30:00 |
|