oval
via4
|
accepted | 2014-02-24T04:00:17.202-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Anna Min | organization | BigFix, Inc |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption. | family | windows | id | oval:org.mitre.oval:def:1446 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | IE5 COM Object Instantiation Memory Corruption (Win2K) | version | 71 |
accepted | 2014-02-24T04:00:20.491-05:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Matthew Wojcik | organization | The MITRE Corporation |
name | Preeti Subramanian | organization | SecPod Technologies |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
name | Maria Mikhno | organization | ALTX-SOFT |
| description | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption. | family | windows | id | oval:org.mitre.oval:def:1589 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | IE6 COM Object Instantiation Memory Corruption (Win2K/XP,SP1) | version | 73 |
accepted | 2011-05-16T04:01:30.962-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Jonathan Baker | organization | The MITRE Corporation |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption. | family | windows | id | oval:org.mitre.oval:def:1651 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | IE6 COM Object Instantiation Memory Corruption (Server 2003) | version | 68 |
accepted | 2011-05-16T04:01:38.452-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption. | family | windows | id | oval:org.mitre.oval:def:1704 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | IE6 COM Object Instantiation Memory Corruption (Server 2003,SP1) | version | 68 |
accepted | 2011-05-16T04:03:30.483-04:00 | class | vulnerability | contributors | name | Robert L. Hollis | organization | ThreatGuard, Inc. |
name | Dragos Prisaca | organization | Gideon Technologies, Inc. |
name | Sudhir Gandhe | organization | Telos |
name | Shane Shaffer | organization | G2, Inc. |
| description | Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption. | family | windows | id | oval:org.mitre.oval:def:791 | status | accepted | submitted | 2006-04-12T12:55:00.000-04:00 | title | IE6 COM Object Instantiation Memory Corruption (WinXP) | version | 69 |
|