Page 12 of 66 results (0.003 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 1

Internet Explorer 5 allows remote attackers to read files via an ExecCommand method called on an IFRAME. • https://www.exploit-db.com/exploits/19539 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243638 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-042 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.1EPSS: 0%CPEs: 2EXPL: 3

Buffer overflow in Registration Wizard ActiveX control (regwizc.dll, InvokeRegWizard) 3.0.0.0 for Internet Explorer 4.01 and 5 allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/19528 http://www.kb.cert.org/vuls/id/37556 http://www.securityfocus.com/archive/1/28719 http://www.securityfocus.com/bid/671 https://exchange.xforce.ibmcloud.com/vulnerabilities/3311 •

CVSS: 10.0EPSS: 3%CPEs: 2EXPL: 1

Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability. • https://www.exploit-db.com/exploits/19490 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241361 http://www.securityfocus.com/bid/627 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.1EPSS: 1%CPEs: 2EXPL: 4

The Kodak/Wang (1) Image Edit (imgedit.ocx), (2) Image Annotation (imgedit.ocx), (3) Image Scan (imgscan.ocx), (4) Thumbnail Image (imgthumb.ocx), (5) Image Admin (imgadmin.ocx), (6) HHOpen (hhopen.ocx), (7) Registration Wizard (regwizc.dll), and (8) IE Active Setup (setupctl.dll) ActiveX controls for Internet Explorer (IE) 4.01 and 5.0 are marked as "Safe for Scripting," which allows remote attackers to create and modify files and execute arbitrary commands. • https://www.exploit-db.com/exploits/19528 https://www.exploit-db.com/exploits/19515 https://www.exploit-db.com/exploits/19521 http://www.kb.cert.org/vuls/id/23412 http://www.kb.cert.org/vuls/id/24839 http://www.kb.cert.org/vuls/id/26924 http://www.kb.cert.org/vuls/id/41408 http://www.kb.cert.org/vuls/id/9162 http://www.securityfocus.com/archive/1/28719 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037 https: •

CVSS: 4.0EPSS: 2%CPEs: 2EXPL: 1

The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. • https://www.exploit-db.com/exploits/19487 http://ciac.llnl.gov/ciac/bulletins/j-064.shtml •