Page 120 of 715 results (0.017 seconds)

CVSS: 7.5EPSS: 27%CPEs: 4EXPL: 1

Microsoft Internet Explorer 5.5 and 6.0 does not properly verify the domain of a frame within a browser window, which allows remote attackers to read client files or invoke executable objects via the Object tag, aka "Cross Domain Verification in Object Tag." • https://www.exploit-db.com/exploits/21606 http://www.iss.net/security_center/static/9537.php http://www.securityfocus.com/bid/5196 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-047 •

CVSS: 6.4EPSS: 94%CPEs: 11EXPL: 1

Internet Explorer 4.0 and later allows remote attackers to read arbitrary files via a web page that accesses a legacy XML Datasource applet (com.ms.xml.dso.XMLDSO.class) and modifies the base URL to point to the local system, which is trusted by the applet. • https://www.exploit-db.com/exploits/21721 http://marc.info/?l=bugtraq&m=102960731805373&w=2 http://www.iss.net/security_center/static/9885.php http://www.securityfocus.com/bid/5490 •

CVSS: 7.5EPSS: 74%CPEs: 4EXPL: 1

The Web Folder component for Internet Explorer 5.5 and 6.0 writes an error message to a known location in the temporary folder, which allows remote attackers to execute arbitrary code by injecting it into the error message, then referring to the error message file via a mhtml: URL. El componente de Carpetas Web en Internet Explorer 5.5 y 6.0 escribe un mensaje de error en una localización conocida en una carpeta temporal, lo que permite a atacantes remotos ejecutar código arbitrario inyectándolo en el mensaje de error, y refiriendose al mensaje de error mediante una URL mhtml: • https://www.exploit-db.com/exploits/21711 http://marc.info/?l=bugtraq&m=102942234427691&w=2 http://marc.info/?l=ntbugtraq&m=102937705527922&w=2 http://marc.info/?l=vuln-dev&m=102943486811091&w=2 http://www.iss.net/security_center/static/9881.php http://www.securityfocus.com/bid/5473 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-014 •

CVSS: 2.6EPSS: 12%CPEs: 3EXPL: 4

The Google toolbar 1.1.60, when running on Internet Explorer 5.5 and 6.0, allows remote attackers to cause a denial of service (crash with an exception in oleaut32.dll) via malicious HTML, possibly related to small width and height parameters or an incorrect call to the Google.Search() function. • https://www.exploit-db.com/exploits/21712 http://online.securityfocus.com/archive/1/287498 http://www.iss.net/security_center/static/9883.php http://www.securityfocus.com/bid/5477 http://www.sztolnia.pl/hack/googIE/googIE.html •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Internet Explorer 5, 5.6, and 6 allows remote attackers to bypass cookie privacy settings and store information across browser sessions via the userData (storeuserData) feature. • http://marc.info/?l=bugtraq&m=102864890006745&w=2 •