Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.800461
Categoría:Windows
Título:Microsoft Internet Explorer Information Disclosure Vulnerability (980088)
Resumen:Internet Explorer is prone to an information disclosure vulnerability.;; This VT has been deprecated and replaced by the VT with the OID: 1.3.6.1.4.1.25623.1.0.902191.
Descripción:Summary:
Internet Explorer is prone to an information disclosure vulnerability.

This VT has been deprecated and replaced by the VT with the OID: 1.3.6.1.4.1.25623.1.0.902191.

Vulnerability Insight:
The issue is due to the browser failing to prevent local content from
being rendered as HTML via the 'file://' protocol, which could allow attackers
to access files with an already known filename and location on a vulnerable
system.

Vulnerability Impact:
Successful exploitation will allow remote attackers to gain knowledge of
sensitive information.

Affected Software/OS:
Internet Explorer Version 5.x, 6.x, 7.x and 8.x.

Solution:
Apply the patch from the referenced advisory.

CVSS Score:
4.3

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-0255
BugTraq ID: 38055
http://www.securityfocus.com/bid/38055
BugTraq ID: 38056
http://www.securityfocus.com/bid/38056
Bugtraq: 20100203 CORE-2009-0625: Internet Explorer Dynamic OBJECT tag and URLMON sniffing vulnerabilities (Google Search)
http://www.securityfocus.com/archive/1/509345/100/0/threaded
Cert/CC Advisory: TA10-159B
http://www.us-cert.gov/cas/techalerts/TA10-159B.html
http://isc.sans.org/diary.html?n&storyid=8152
http://www.coresecurity.com/content/internet-explorer-dynamic-object-tag
Microsoft Security Bulletin: MS10-035
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-035
http://osvdb.org/62156
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7145
CopyrightCopyright (C) 2010 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.