Page 26 of 239 results (0.008 seconds)

CVSS: 5.1EPSS: 96%CPEs: 3EXPL: 1

Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, including (1) devenum.dll, (2) diactfrm.dll, (3) wmm2filt.dll, (4) fsusd.dll, (5) dmdskmgr.dll, (6) browsewm.dll, (7) browseui.dll, (8) shell32.dll, (9) mshtml.dll, (10) inetcfg.dll, (11) infosoft.dll, (12) query.dll, (13) syncui.dll, (14) clbcatex.dll, (15) clbcatq.dll, (16) comsvcs.dll, and (17) msconf.dll, which causes memory corruption, aka "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2087. • https://www.exploit-db.com/exploits/1144 http://secunia.com/advisories/16373 http://securitytracker.com/id?1014643 http://www.kb.cert.org/vuls/id/959049 http://www.securityfocus.com/bid/14511 http://www.us-cert.gov/cas/techalerts/TA05-221A.html http://www.vupen.com/english/advisories/2005/1353 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-038 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A100082 https:/& •

CVSS: 5.0EPSS: 96%CPEs: 11EXPL: 1

Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll). NOTE: the researcher says that the vendor could not reproduce this problem. • https://www.exploit-db.com/exploits/1079 http://marc.info/?l=bugtraq&m=112006764714946&w=2 http://secunia.com/advisories/15891 http://securitytracker.com/id?1014329 http://www.auscert.org.au/render.html?it=5225 http://www.kb.cert.org/vuls/id/939605 http://www.kb.cert.org/vuls/id/959049 http://www.microsoft.com/technet/security/advisory/903144.mspx http://www.osvdb.org/17680 http://www.securityfocus.com/archive/1/404055 http://www.securityfocus.com/bid/ • CWE-399: Resource Management Errors •

CVSS: 5.1EPSS: 94%CPEs: 5EXPL: 1

Race condition in the memory management routines in the DHTML object processor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious web page or HTML e-mail, aka "DHTML Object Memory Corruption Vulnerability". • https://www.exploit-db.com/exploits/25386 http://secunia.com/advisories/14922 http://www.idefense.com/application/poi/display?id=228&type=vulnerabilities http://www.kb.cert.org/vuls/id/774338 http://www.us-cert.gov/cas/techalerts/TA05-102A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 https://exchange.xforce.ibmcloud.com/vulnerabilities/19831 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1695 https://oval •

CVSS: 7.5EPSS: 95%CPEs: 3EXPL: 1

Buffer overflow in the URL processor of Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a URL with a long hostname, aka "URL Parsing Memory Corruption Vulnerability." • https://www.exploit-db.com/exploits/931 http://secunia.com/advisories/14922 http://www.idefense.com/application/poi/display?id=229&type=vulnerabilities http://www.kb.cert.org/vuls/id/756122 http://www.us-cert.gov/cas/techalerts/TA05-102A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1196 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre. •

CVSS: 7.5EPSS: 88%CPEs: 3EXPL: 1

Buffer overflow in the Content Advisor in Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a crafted Content Advisor file, aka "Content Advisor Memory Corruption Vulnerability." • https://www.exploit-db.com/exploits/25385 http://secunia.com/advisories/14922 http://www.kb.cert.org/vuls/id/222050 http://www.us-cert.gov/cas/techalerts/TA05-102A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-020 https://exchange.xforce.ibmcloud.com/vulnerabilities/19842 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2077 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2786 h •