Page 139 of 715 results (0.010 seconds)

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 1

The "download behavior" in Internet Explorer 5 allows remote attackers to read arbitrary files via a server-side redirect. • https://www.exploit-db.com/exploits/19530 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242542 http://www.ciac.org/ciac/bulletins/k-002.shtml http://www.kb.cert.org/vuls/id/37828 http://www.osvdb.org/11274 http://www.securityfocus.com/bid/674 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-040 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands. • http://ciac.llnl.gov/ciac/bulletins/j-064.shtml https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 2

Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell. • https://www.exploit-db.com/exploits/19471 http://marc.info/?l=ntbugtraq&m=93578772920970&w=2 http://www.securityfocus.com/bid/606 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Internet Explorer 5.0 records the username and password for FTP servers in the URL history, which could allow (1) local users to read the information from another user's index.dat, or (2) people who are physically observing ("shoulder surfing") another user to read the information from the status bar when the user moves the mouse over a link. • https://www.exploit-db.com/exploits/19473 http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=ind9904&L=NTBUGTRAQ&P=R179 http://packetderm.cotse.com/mailing-lists/ntbugtraq/1999/0364.html https://exchange.xforce.ibmcloud.com/vulnerabilities/3289 •

CVSS: 5.1EPSS: 38%CPEs: 2EXPL: 1

The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. • https://www.exploit-db.com/exploits/19468 http://ciac.llnl.gov/ciac/bulletins/j-064.shtml http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ240308 http://www.securityfocus.com/bid/598 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 •