Computer Security
[EN] securityvulns.ru no-pyccku


Microsoft Visual Studio WMI Object Broker ActiveX code execution
updated since 12.12.2006
Published:13.12.2006
Source:
SecurityVulns ID:6919
Type:client
Threat Level:
6/10
Description:Object can be used to bypass internet zone restrictions.
Affected:MICROSOFT : Visual Studio 2005
Original documentdocumentZDI, ZDI-06-047: Microsoft Visual Studio WmiScriptUtils.dll Cross-Zone Scripting Vulnerability (13.12.2006)
 documentMICROSOFT, Microsoft Security Bulletin MS06-073 Vulnerability in Visual Studio 2005 Could Allow Remote Code Execution (925674) (12.12.2006)
Files:Microsoft Security Bulletin MS06-073 Vulnerability in Visual Studio 2005 Could Allow Remote Code Execution (925674)

Microsoft Internet Explorer / Outlook Express multiple security vulnerabilities
updated since 12.12.2006
Published:13.12.2006
Source:
SecurityVulns ID:6918
Type:client
Threat Level:
7/10
Description:Memory corruption on Javascript errors processing and Javascript normalize() function. Temporary Internet Files crossite access. Buffer overflow on Windows Address Book (WAB) parsing.
Affected:MICROSOFT : Windows 2000 Server
 MICROSOFT : Windows 2000 Professional
 MICROSOFT : Windows XP
 MICROSOFT : Windows 2003 Server
Original documentdocumentSECUNIA, [Full-disclosure] ZDI-06-048: Microsoft Internet Explorer normalize() Function Memory Corruption Vulnerability (13.12.2006)
 documentSECUNIA, [Full-disclosure] Secunia Research: Internet Explorer Script Error Handling Memory Corruption (13.12.2006)
 documentMICROSOFT, Microsoft Security Bulletin MS06-076 Cumulative Security Update for Outlook Express (923694) (12.12.2006)
 documentMICROSOFT, Microsoft Security Bulletin MS06-072 (12.12.2006)
Files:Microsoft Security Bulletin MS06-072 Cumulative Security Update for Internet Explorer (925454)
 Microsoft Security Bulletin MS06-076 Cumulative Security Update for Outlook Express (923694)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod