Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.901162
Categoría:Windows : Microsoft Bulletins
Título:Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
Resumen:This host is missing a critical security update according to; Microsoft Bulletin MS10-071.
Descripción:Summary:
This host is missing a critical security update according to
Microsoft Bulletin MS10-071.

Vulnerability Insight:
- The browser allowing for automated, scripted instructions to simulate user
actions on the AutoComplete feature, which could allow attackers to capture
information previously entered into fields after the AutoComplete feature
has been enabled.

- An error in the way the toStaticHTML API sanitizes HTML, which could allow
cross-site scripting attacks.

- An error when processing CSS special characters, which could allow attackers
to view content from another domain or Internet Explorer zone.

- An uninitialized memory corruption error when processing malformed data,
which could allow attackers to execute arbitrary code via a malicious web page.

- The Anchor element not being removed from the editable HTML element during
specific user operations, potentially revealing personally identifiable
information intended for deletion.

- The browser allowing scripts to access and read content from different domains,
which could allow cross-domain scripting attacks.

Vulnerability Impact:
Successful exploitation could allow remote attackers to gain knowledge of
sensitive information or execute arbitrary code.

Affected Software/OS:
Microsoft Internet Explorer version 6.x/7.x/8.x.

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-3331
Cert/CC Advisory: TA10-285A
http://www.us-cert.gov/cas/techalerts/TA10-285A.html
Microsoft Security Bulletin: MS10-071
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-071
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6832
Common Vulnerability Exposure (CVE) ID: CVE-2010-3330
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6928
Common Vulnerability Exposure (CVE) ID: CVE-2010-3329
BugTraq ID: 43706
http://www.securityfocus.com/bid/43706
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7482
Common Vulnerability Exposure (CVE) ID: CVE-2010-3328
BugTraq ID: 43705
http://www.securityfocus.com/bid/43705
http://www.zerodayinitiative.com/advisories/ZDI-10-197/
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7059
Common Vulnerability Exposure (CVE) ID: CVE-2010-3327
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7417
Common Vulnerability Exposure (CVE) ID: CVE-2010-3326
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7207
Common Vulnerability Exposure (CVE) ID: CVE-2010-3325
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7410
Common Vulnerability Exposure (CVE) ID: CVE-2010-3243
Microsoft Security Bulletin: MS10-072
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-072
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7637
Common Vulnerability Exposure (CVE) ID: CVE-2010-3324
http://archives.neohapsis.com/archives/fulldisclosure/2010-08/0179.html
http://www.wooyun.org/bug.php?action=view&id=189
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7297
Common Vulnerability Exposure (CVE) ID: CVE-2010-0808
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6889
CopyrightCopyright (C) 2010 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.