CVE-2006-5745
🟡 Monitoruj
Podatność w metodzie setRequestHeader ActiveX Control 4.0 umożliwia zdalne wykonanie kodu.
CVSS
7.6
EPSS
87.4%
Exploit
poc
Vendor
microsoft
Opis źródłowy (NVD)
Unspecified vulnerability in the setRequestHeader method in the XMLHTTP (XML HTTP) ActiveX Control 4.0 in Microsoft XML Core Services 4.0 on Windows, when accessed by Internet Explorer, allows remote attackers to execute arbitrary code via crafted arguments that lead to memory corruption, a different vulnerability than CVE-2006-4685. NOTE: some of these details are obtained from third party information.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.6 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 87.4% |
| Opublikowano (NVD) | 2006-11-06 18:07:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-23 00:35:47 UTC |
Referencje
- http://blogs.securiteam.com/?p=717 (cve@mitre.org)
- http://secunia.com/advisories/22687 (cve@mitre.org) [Vendor Advisory]
- http://securitytracker.com/id?1017157 (cve@mitre.org)
- http://www.iss.net/threats/239.html (cve@mitre.org)
- http://www.kb.cert.org/vuls/id/585137 (cve@mitre.org) [US Government Resource]
- http://www.microsoft.com/technet/security/advisory/927892.mspx (cve@mitre.org)
- http://www.securityfocus.com/bid/20915 (cve@mitre.org) [Exploit]
- http://www.us-cert.gov/cas/techalerts/TA06-318A.html (cve@mitre.org) [US Government Resource]
- http://www.vupen.com/english/advisories/2006/4334 (cve@mitre.org)
- http://xforce.iss.net/xforce/alerts/id/239 (cve@mitre.org) [Vendor Advisory]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-071 (cve@mitre.org)
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30004 (cve@mitre.org)
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A104 (cve@mitre.org)
- https://www.exploit-db.com/exploits/2743 (cve@mitre.org)