← Volver a CVEs
CVE-2006-1245
N/ADescripcion
Buffer overflow in mshtml.dll in Microsoft Internet Explorer 6.0.2900.2180, and probably other versions, allows remote attackers to execute arbitrary code via an HTML tag with a large number of script action handlers such as onload and onmouseover, as demonstrated using onclick, aka the "Multiple Event Handler Memory Corruption Vulnerability."
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado3/17/2006
Ultima modificacion4/16/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
microsoft:ie
Referencias
http://archives.neohapsis.com/archives/bugtraq/2006-02/0855.html(secure@microsoft.com)
http://secunia.com/advisories/18957(secure@microsoft.com)
http://secunia.com/advisories/19269(secure@microsoft.com)
http://securitytracker.com/id?1015794(secure@microsoft.com)
http://www.kb.cert.org/vuls/id/984473(secure@microsoft.com)
http://www.osvdb.org/23964(secure@microsoft.com)
http://www.securityfocus.com/archive/1/428810/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/archive/1/453436/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/archive/1/453554/100/0/threaded(secure@microsoft.com)
http://www.securityfocus.com/bid/17131(secure@microsoft.com)
http://www.us-cert.gov/cas/techalerts/TA06-101A.html(secure@microsoft.com)
http://www.vupen.com/english/advisories/2006/1318(secure@microsoft.com)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013(secure@microsoft.com)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25292(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1451(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1569(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1599(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1632(secure@microsoft.com)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1766(secure@microsoft.com)
http://archives.neohapsis.com/archives/bugtraq/2006-02/0855.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/18957(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/19269(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1015794(af854a3a-2127-422b-91ae-364da2661108)
http://www.kb.cert.org/vuls/id/984473(af854a3a-2127-422b-91ae-364da2661108)
http://www.osvdb.org/23964(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/428810/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/453436/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/453554/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/17131(af854a3a-2127-422b-91ae-364da2661108)
http://www.us-cert.gov/cas/techalerts/TA06-101A.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/1318(af854a3a-2127-422b-91ae-364da2661108)
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-013(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25292(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1451(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1569(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1599(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1632(af854a3a-2127-422b-91ae-364da2661108)
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1766(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.