Page 26 of 324 results (0.005 seconds)

CVSS: 5.1EPSS: 96%CPEs: 3EXPL: 1

Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, including (1) devenum.dll, (2) diactfrm.dll, (3) wmm2filt.dll, (4) fsusd.dll, (5) dmdskmgr.dll, (6) browsewm.dll, (7) browseui.dll, (8) shell32.dll, (9) mshtml.dll, (10) inetcfg.dll, (11) infosoft.dll, (12) query.dll, (13) syncui.dll, (14) clbcatex.dll, (15) clbcatq.dll, (16) comsvcs.dll, and (17) msconf.dll, which causes memory corruption, aka "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2087. • https://www.exploit-db.com/exploits/1144 http://secunia.com/advisories/16373 http://securitytracker.com/id?1014643 http://www.kb.cert.org/vuls/id/959049 http://www.securityfocus.com/bid/14511 http://www.us-cert.gov/cas/techalerts/TA05-221A.html http://www.vupen.com/english/advisories/2005/1353 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100082 https:/& •

CVSS: 5.1EPSS: 91%CPEs: 3EXPL: 2

Unknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to execute arbitrary code via a web site or an HTML e-mail containing a crafted JPEG image that causes memory corruption, aka "JPEG Image Rendering Memory Corruption Vulnerability". • https://www.exploit-db.com/exploits/25991 https://www.exploit-db.com/exploits/1144 http://secunia.com/advisories/16373 http://www.kb.cert.org/vuls/id/965206 http://www.us-cert.gov/cas/techalerts/TA05-221A.html http://www.vupen.com/english/advisories/2005/1353 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1140 https://oval.cisecurity.org/repository/search •

CVSS: 5.0EPSS: 96%CPEs: 11EXPL: 1

Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem. • https://www.exploit-db.com/exploits/1079 http://marc.info/?l=bugtraq&m=112006764714946&w=2 http://secunia.com/advisories/15891 http://securitytracker.com/id?1014329 http://www.auscert.org.au/render.html?it=5225 http://www.kb.cert.org/vuls/id/939605 http://www.kb.cert.org/vuls/id/959049 http://www.microsoft.com/technet/security/advisory/903144.mspx http://www.osvdb.org/17680 http://www.securityfocus.com/archive/1/404055 http://www.securityfocus.com/bid/ • CWE-399: Resource Management Errors •

CVSS: 7.5EPSS: 95%CPEs: 3EXPL: 1

Buffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability." • https://www.exploit-db.com/exploits/931 http://secunia.com/advisories/14922 http://www.idefense.com/application/poi/display?id=229&type=vulnerabilities http://www.kb.cert.org/vuls/id/756122 http://www.us-cert.gov/cas/techalerts/TA05-102A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1196 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •

CVSS: 5.1EPSS: 95%CPEs: 5EXPL: 1

Race condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail, aka "DHTML Object Memory Corruption Vulnerability". • https://www.exploit-db.com/exploits/25386 http://secunia.com/advisories/14922 http://www.idefense.com/application/poi/display?id=228&type=vulnerabilities http://www.kb.cert.org/vuls/id/774338 http://www.us-cert.gov/cas/techalerts/TA05-102A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 https://exchange.xforce.ibmcloud.com/vulnerabilities/19831 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1695 https://oval •