oval
via4
|
accepted | 2014-02-24T04:00:07.563-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Jonathan Baker | organization | The MITRE Corporation |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability." | family | windows | id | oval:org.mitre.oval:def:1091 | status | accepted | submitted | 2005-11-11T12:00:00.000-04:00 | title | Server 2003 IE Mismatched Document Object Memory Corruption Vulnerability | version | 71 |
accepted | 2014-02-24T04:00:13.361-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Jonathan Baker | organization | The MITRE Corporation |
name | Dragos Prisaca | organization | Gideon Technologies, Inc. |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability." | family | windows | id | oval:org.mitre.oval:def:1299 | status | accepted | submitted | 2005-11-11T12:00:00.000-04:00 | title | WinXP,SP2 IE Mismatched Document Object Memory Corruption Vulnerability | version | 72 |
accepted | 2014-02-24T04:00:13.568-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Jonathan Baker | organization | The MITRE Corporation |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability." | family | windows | id | oval:org.mitre.oval:def:1303 | status | accepted | submitted | 2005-11-11T12:00:00.000-04:00 | title | WinXP,SP1 (64-bit) IE Mismatched Document Object Memory Corruption Vulnerability | version | 71 |
accepted | 2014-02-24T04:00:17.981-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Anna Min | organization | BigFix, Inc |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability." | family | windows | id | oval:org.mitre.oval:def:1489 | status | accepted | submitted | 2005-11-11T12:00:00.000-04:00 | title | Win2k,SP4 IE Mismatched Document Object Memory Corruption Vulnerability | version | 71 |
accepted | 2014-02-24T04:00:18.888-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Jonathan Baker | organization | The MITRE Corporation |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Jeff Cheng | organization | Opsware, Inc. |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability." | family | windows | id | oval:org.mitre.oval:def:1508 | status | accepted | submitted | 2005-11-11T12:00:00.000-04:00 | title | Server 2003,SP1 IE Mismatched Document Object Memory Corruption Vulnerability | version | 72 |
accepted | 2014-02-24T04:03:26.143-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability." | family | windows | id | oval:org.mitre.oval:def:722 | status | accepted | submitted | 2005-11-11T12:00:00.000-04:00 | title | Win2K/XP,SP1 IE Mismatched Document Object Memory Corruption Vulnerability | version | 71 |
|