Page 24 of 134 results (0.010 seconds)

CVSS: 5.1EPSS: 82%CPEs: 1EXPL: 1

Internet Explorer 5.5 and earlier executes Telnet sessions using command line arguments that are specified by the web site, which could allow remote attackers to execute arbitrary commands if the IE client is using the Telnet client provided in Services for Unix (SFU) 2.0, which creates session transcripts. • https://www.exploit-db.com/exploits/20680 http://www.osvdb.org/7816 http://www.securityfocus.com/bid/2463 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-015 https://exchange.xforce.ibmcloud.com/vulnerabilities/6230 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 7.5EPSS: 6%CPEs: 4EXPL: 0

Internet Explorer 5.5 and earlier allows remote attackers to obtain the physical location of cached content and open the content in the Local Computer Zone, then use compiled HTML help (.chm) files to execute arbitrary programs. • http://www.guninski.com/chmtempmain.html http://www.osvdb.org/7823 http://www.securityfocus.com/bid/2456 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-015 https://exchange.xforce.ibmcloud.com/vulnerabilities/5567 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A920 •

CVSS: 7.5EPSS: 3%CPEs: 2EXPL: 0

HTML e-mail feature in Internet Explorer 5.5 and earlier allows attackers to execute attachments by setting an unusual MIME type for the attachment, which Internet Explorer does not process correctly. Funcionalidad HTML en Internet Explorer 5.5 y anteriores, que permite al atacante la ejecución de un archivo adjunto. Se consigue gracias al envío de cabeceras MIME inválidas para el adjunto que le permiten disfrazarse como un tipo de archivo no ejecutable. El correo electrónico vía HTML se representa en páginas web que el explorador es capaz de interpretar. Cuando el correo contiene ficheros adjuntos el Explorador también es capaz de abrir la aplicación asociada a los ficheros binarios adjuntos cuyo tipo (extensión de archivo) está definido en las cabeceras MIME. • http://marc.info/?l=bugtraq&m=98596775905044&w=2 http://securitytracker.com/id?1001197 http://www.cert.org/advisories/CA-2001-06.html http://www.ciac.org/ciac/bulletins/l-066.shtml http://www.osvdb.org/7806 http://www.securityfocus.com/bid/2524 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-020 https://exchange.xforce.ibmcloud.com/vulnerabilities/6306 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A141 •

CVSS: 7.5EPSS: 3%CPEs: 4EXPL: 2

Internet Explorer 5.0 and 5.5, and Outlook Express 5.0 and 5.5, allow remote attackers to execute scripts when Active Scripting is disabled by including the scripts in XML stylesheets (XSL) that are referenced using an IFRAME tag, possibly due to a vulnerability in Windows Scripting Host (WSH). • https://www.exploit-db.com/exploits/20782 http://www.securityfocus.com/archive/1/3AE02004.57FDF958%40guninski.com http://www.securityfocus.com/bid/2633 https://exchange.xforce.ibmcloud.com/vulnerabilities/6448 •

CVSS: 2.6EPSS: 0%CPEs: 3EXPL: 0

A function in Internet Explorer 5.0 through 5.5 does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files, aka a new variant of the "Frame Domain Verification" vulnerability. • http://www.osvdb.org/7817 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-093 https://exchange.xforce.ibmcloud.com/vulnerabilities/6086 •