Page 12 of 85 results (0.005 seconds)

CVSS: 7.6EPSS: 0%CPEs: 4EXPL: 0

Internet Explorer 4.x and 5.x allows remote attackers to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability. • http://www.microsoft.com/technet/support/kb.asp?ID=261257 http://www.securityfocus.com/bid/1223 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-033 •

CVSS: 2.6EPSS: 0%CPEs: 6EXPL: 0

Internet Explorer 4.0 and 5.0 allows a malicious web site to obtain client cookies from another domain by including that domain name and escaped characters in a URL, aka the "Unauthorized Cookie Access" vulnerability. • http://www.osvdb.org/1326 http://www.securityfocus.com/bid/1194 http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000511135609.D7774%40securityfocus.com http://www.securityfocus.com/templates/archive.pike?list=1&msg=NDBBKGHPMKBKDDGLDEEHAEHMDIAA.rms2000%40bellatlantic.net https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-033 https://exchange.xforce.ibmcloud.com/vulnerabilities/4447 •

CVSS: 5.1EPSS: 0%CPEs: 9EXPL: 0

The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-011 •

CVSS: 5.1EPSS: 0%CPEs: 4EXPL: 1

Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the "Image Source Redirect" vulnerability. • https://www.exploit-db.com/exploits/19719 http://www.osvdb.org/7827 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-009 https://exchange.xforce.ibmcloud.com/vulnerabilities/3996 •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 1

Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading. • https://www.exploit-db.com/exploits/19719 http://www.securityfocus.com/bid/923 •