Page 38 of 225 results (0.005 seconds)

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Internet Explorer 5, 5.6, and 6 allows remote attackers to bypass cookie privacy settings and store information across browser sessions via the userData (storeuserData) feature. • http://marc.info/?l=bugtraq&m=102864890006745&w=2 •

CVSS: 7.5EPSS: 58%CPEs: 12EXPL: 1

Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response. Desbordamiento de búfer en el cliente gopher de Microsoft Internet Explorer 5.1 a la 6.0, Proxy Server 2.0, o ISA Server 2000 permite a atacantes remotos la ejecución de código arbitrario mediante una URL gopher:// que redirige al usuario a un servidor gopher real o simulado que envía una respuesta larga. • https://www.exploit-db.com/exploits/21510 http://marc.info/?l=bugtraq&m=102320516707940&w=2 http://marc.info/?l=bugtraq&m=102397955217618&w=2 http://online.securityfocus.com/archive/1/276848 http://www.iss.net/security_center/static/9247.php http://www.kb.cert.org/vuls/id/440275 http://www.pivx.com/workaround_fail.html http://www.securityfocus.com/bid/4930 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-027 https://oval.cisecurity •

CVSS: 5.0EPSS: 2%CPEs: 7EXPL: 2

Internet Explorer 5.01 through 6 allows remote attackers to cause a denial of service (application crash) via Javascript in a web page that calls location.replace on itself, causing a loop. • https://www.exploit-db.com/exploits/21346 http://online.securityfocus.com/archive/1/262994 http://www.iss.net/security_center/static/8488.php http://www.securityfocus.com/bid/4322 •

CVSS: 5.0EPSS: 1%CPEs: 8EXPL: 1

Internet Explorer 5.0 through 6.0 allows remote attackers to determine the existence of files on the client via an IMG tag with a dynsrc property that references the target file, which sets certain elements of the image object such as file size. • http://archives.neohapsis.com/archives/bugtraq/2002-03/0331.html http://www.iss.net/security_center/static/8658.php http://www.securityfocus.com/bid/4371 •

CVSS: 7.5EPSS: 4%CPEs: 7EXPL: 0

Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to execute arbitrary code under fewer security restrictions via a malformed web page that requires NetBIOS connectivity, aka "Zone Spoofing through Malformed Web Page" vulnerability. Microsoft Internet Explorer 5.01, 5.5 y 6.0 permite a atacantes remotos ejecutar código arbitrario con menos restricciones de seguridad mediante una página Web malformada que requiere conectividad NetBIOS. También conocida como "Vulnerabilidad de engaño de zona mediante una página Web malformada". • http://www.iss.net/security_center/static/9084.php http://www.kb.cert.org/vuls/id/242891 http://www.securityfocus.com/bid/4753 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-023 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A923 •