CVE-2005-2830
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
14/12/2005
Última modificación:
03/04/2025
Descripción
Microsoft Interntet Explorer 5.01, 5.5 y 6, cuando usan un servidor proxy HTTPS que requiere autenticación básica, envía la URL en texto claro, lo que permite a atacantes remotos obtener información sensible, tcc "Vulnerabilidad proxy HTTPS"
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:microsoft:ie:6.0:sp1:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.0.1:sp4:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:5.5:sp2:*:*:*:*:*:* | ||
cpe:2.3:a:microsoft:internet_explorer:6.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://secunia.com/advisories/15368
- http://secunia.com/advisories/18064
- http://secunia.com/advisories/18311
- http://securitytracker.com/id?1015350=
- http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
- http://www.securityfocus.com/bid/15825
- http://www.vupen.com/english/advisories/2005/2867
- http://www.vupen.com/english/advisories/2005/2909
- http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-054
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23451
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1097
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1101
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1143
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1317
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1435
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1521
- http://secunia.com/advisories/15368
- http://secunia.com/advisories/18064
- http://secunia.com/advisories/18311
- http://securitytracker.com/id?1015350=
- http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
- http://www.securityfocus.com/bid/15825
- http://www.vupen.com/english/advisories/2005/2867
- http://www.vupen.com/english/advisories/2005/2909
- http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?cscat=BLTNDETAIL&DocumentOID=375420
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-054
- https://exchange.xforce.ibmcloud.com/vulnerabilities/23451
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1097
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1101
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1143
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1317
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1435
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1521