CVE-2006-2900
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-200
Revelación de información
Fecha de publicación:
07/06/2006
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Internet Explorer 6 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form.
Impacto
Puntuación base 2.0
4.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:microsoft:ie:5.01:windows_2000_sp4:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:ie:6:*:windows_xp_professional_64bit:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:ie:6:sp1:windows_98:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:ie:6:sp1:windows_98_se:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:ie:6:sp1:windows_millennium:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:ie:6:sp1:windows_xpsp1:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:ie:6:windows_2000_sp4:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:ie:6:windows_server_2003_sp1_itanium:*:*:*:*:*:* | ||
| cpe:2.3:a:microsoft:ie:6:windows_xp_sp2:*:*:*:*:*:* | ||
| cpe:2.3:h:canon:network_camera_server_vb101:*:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046610.html
- http://secunia.com/advisories/20449
- http://securityreason.com/securityalert/1059
- http://www.securityfocus.com/bid/18308
- http://www.vupen.com/english/advisories/2006/2161
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/046610.html
- http://secunia.com/advisories/20449
- http://securityreason.com/securityalert/1059
- http://www.securityfocus.com/bid/18308
- http://www.vupen.com/english/advisories/2006/2161



