Page 101 of 638 results (0.030 seconds)

CVSS: 5.1EPSS: 95%CPEs: 5EXPL: 1

Race condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail, aka "DHTML Object Memory Corruption Vulnerability". • https://www.exploit-db.com/exploits/25386 http://secunia.com/advisories/14922 http://www.idefense.com/application/poi/display?id=228&type=vulnerabilities http://www.kb.cert.org/vuls/id/774338 http://www.us-cert.gov/cas/techalerts/TA05-102A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 https://exchange.xforce.ibmcloud.com/vulnerabilities/19831 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1695 https://oval •

CVSS: 7.5EPSS: 88%CPEs: 3EXPL: 1

Buffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability." • https://www.exploit-db.com/exploits/25385 http://secunia.com/advisories/14922 http://www.kb.cert.org/vuls/id/222050 http://www.us-cert.gov/cas/techalerts/TA05-102A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 https://exchange.xforce.ibmcloud.com/vulnerabilities/19842 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2077 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2786 h •

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

Windows Explorer and Internet Explorer in Windows 2000 SP1 allows remote attackers to cause a denial of service (CPU consumption) via a malformed Windows Metafile (WMF) file. • http://marc.info/?l=bugtraq&m=111231106513788&w=2 http://www.securiteam.com/windowsntfocus/5CP081FFFY.html http://www.securityfocus.com/bid/9892 https://exchange.xforce.ibmcloud.com/vulnerabilities/15507 •

CVSS: 5.0EPSS: 30%CPEs: 3EXPL: 1

Internet Explorer 6.0 on Windows XP SP2 allows remote attackers to spoof the domain name of a URL in a titlebar for a script-initiated popup window, which could facilitate phishing attacks. • http://marc.info/?l=full-disclosure&m=110895997201027&w=2 http://secunia.com/advisories/14335 http://www.securityfocus.com/bid/12602 https://exchange.xforce.ibmcloud.com/vulnerabilities/19452 •

CVSS: 7.5EPSS: 87%CPEs: 35EXPL: 2

Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability." Internet Explorer 5.01, 5.5 y 6 permite a los atacantes remotos ejecutar código arbitrario mediante eventos de arrastrar y soltar, también conocidos como "Vulnerabilidad de arrastrar y soltar". • https://www.exploit-db.com/exploits/24693 http://www.kb.cert.org/vuls/id/698835 http://www.securityfocus.com/bid/11466 http://www.us-cert.gov/cas/techalerts/TA05-039A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-008 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-014 https://exchange.xforce.ibmcloud.com/vulnerabilities/19117 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1015 https&# •