Page 20 of 114 results (0.010 seconds)

CVSS: 4.3EPSS: 0%CPEs: 3EXPL: 1

Internet Explorer 5 allows remote attackers to read files via an ExecCommand method called on an IFRAME. • https://www.exploit-db.com/exploits/19539 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243638 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-042 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 5.1EPSS: 0%CPEs: 2EXPL: 3

Buffer overflow in Registration Wizard ActiveX control (regwizc.dll, InvokeRegWizard) 3.0.0.0 for Internet Explorer 4.01 and 5 allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/19528 http://www.kb.cert.org/vuls/id/37556 http://www.securityfocus.com/archive/1/28719 http://www.securityfocus.com/bid/671 https://exchange.xforce.ibmcloud.com/vulnerabilities/3311 •

CVSS: 10.0EPSS: 3%CPEs: 2EXPL: 1

Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability. • https://www.exploit-db.com/exploits/19490 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241361 http://www.securityfocus.com/bid/627 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.1EPSS: 1%CPEs: 2EXPL: 4

The Kodak/Wang (1) Image Edit (imgedit.ocx), (2) Image Annotation (imgedit.ocx), (3) Image Scan (imgscan.ocx), (4) Thumbnail Image (imgthumb.ocx), (5) Image Admin (imgadmin.ocx), (6) HHOpen (hhopen.ocx), (7) Registration Wizard (regwizc.dll), and (8) IE Active Setup (setupctl.dll) ActiveX controls for Internet Explorer (IE) 4.01 and 5.0 are marked as "Safe for Scripting," which allows remote attackers to create and modify files and execute arbitrary commands. • https://www.exploit-db.com/exploits/19528 https://www.exploit-db.com/exploits/19515 https://www.exploit-db.com/exploits/19521 http://www.kb.cert.org/vuls/id/23412 http://www.kb.cert.org/vuls/id/24839 http://www.kb.cert.org/vuls/id/26924 http://www.kb.cert.org/vuls/id/41408 http://www.kb.cert.org/vuls/id/9162 http://www.securityfocus.com/archive/1/28719 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037 https: •

CVSS: 5.0EPSS: 3%CPEs: 1EXPL: 1

The "download behavior" in Internet Explorer 5 allows remote attackers to read arbitrary files via a server-side redirect. • https://www.exploit-db.com/exploits/19530 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242542 http://www.ciac.org/ciac/bulletins/k-002.shtml http://www.kb.cert.org/vuls/id/37828 http://www.osvdb.org/11274 http://www.securityfocus.com/bid/674 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-040 • CWE-94: Improper Control of Generation of Code ('Code Injection') •