Page 21 of 114 results (0.003 seconds)

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands. • http://ciac.llnl.gov/ciac/bulletins/j-064.shtml https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 •

CVSS: 4.0EPSS: 2%CPEs: 2EXPL: 1

The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. • https://www.exploit-db.com/exploits/19487 http://ciac.llnl.gov/ciac/bulletins/j-064.shtml •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 2

Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell. • https://www.exploit-db.com/exploits/19471 http://marc.info/?l=ntbugtraq&m=93578772920970&w=2 http://www.securityfocus.com/bid/606 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Internet Explorer 5.0 records the username and password for FTP servers in the URL history, which could allow (1) local users to read the information from another user's index.dat, or (2) people who are physically observing ("shoulder surfing") another user to read the information from the status bar when the user moves the mouse over a link. • https://www.exploit-db.com/exploits/19473 http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=ind9904&L=NTBUGTRAQ&P=R179 http://packetderm.cotse.com/mailing-lists/ntbugtraq/1999/0364.html https://exchange.xforce.ibmcloud.com/vulnerabilities/3289 •

CVSS: 5.1EPSS: 38%CPEs: 2EXPL: 1

The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. • https://www.exploit-db.com/exploits/19468 http://ciac.llnl.gov/ciac/bulletins/j-064.shtml http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ240308 http://www.securityfocus.com/bid/598 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 •