Page 38 of 219 results (0.004 seconds)

CVSS: 7.5EPSS: 74%CPEs: 4EXPL: 1

The Web Folder component for Internet Explorer 5.5 and 6.0 writes an error message to a known location in the temporary folder, which allows remote attackers to execute arbitrary code by injecting it into the error message, then referring to the error message file via a mhtml: URL. El componente de Carpetas Web en Internet Explorer 5.5 y 6.0 escribe un mensaje de error en una localización conocida en una carpeta temporal, lo que permite a atacantes remotos ejecutar código arbitrario inyectándolo en el mensaje de error, y refiriendose al mensaje de error mediante una URL mhtml: • https://www.exploit-db.com/exploits/21711 http://marc.info/?l=bugtraq&m=102942234427691&w=2 http://marc.info/?l=ntbugtraq&m=102937705527922&w=2 http://marc.info/?l=vuln-dev&m=102943486811091&w=2 http://www.iss.net/security_center/static/9881.php http://www.securityfocus.com/bid/5473 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-014 •

CVSS: 6.4EPSS: 94%CPEs: 11EXPL: 1

Internet Explorer 4.0 and later allows remote attackers to read arbitrary files via a web page that accesses a legacy XML Datasource applet (com.ms.xml.dso.XMLDSO.class) and modifies the base URL to point to the local system, which is trusted by the applet. • https://www.exploit-db.com/exploits/21721 http://marc.info/?l=bugtraq&m=102960731805373&w=2 http://www.iss.net/security_center/static/9885.php http://www.securityfocus.com/bid/5490 •

CVSS: 2.6EPSS: 12%CPEs: 3EXPL: 4

The Google toolbar 1.1.60, when running on Internet Explorer 5.5 and 6.0, allows remote attackers to cause a denial of service (crash with an exception in oleaut32.dll) via malicious HTML, possibly related to small width and height parameters or an incorrect call to the Google.Search() function. • https://www.exploit-db.com/exploits/21712 http://online.securityfocus.com/archive/1/287498 http://www.iss.net/security_center/static/9883.php http://www.securityfocus.com/bid/5477 http://www.sztolnia.pl/hack/googIE/googIE.html •

CVSS: 7.5EPSS: 1%CPEs: 3EXPL: 0

Internet Explorer 5, 5.6, and 6 allows remote attackers to bypass cookie privacy settings and store information across browser sessions via the userData (storeuserData) feature. • http://marc.info/?l=bugtraq&m=102864890006745&w=2 •

CVSS: 7.5EPSS: 58%CPEs: 12EXPL: 1

Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response. Desbordamiento de búfer en el cliente gopher de Microsoft Internet Explorer 5.1 a la 6.0, Proxy Server 2.0, o ISA Server 2000 permite a atacantes remotos la ejecución de código arbitrario mediante una URL gopher:// que redirige al usuario a un servidor gopher real o simulado que envía una respuesta larga. • https://www.exploit-db.com/exploits/21510 http://marc.info/?l=bugtraq&m=102320516707940&w=2 http://marc.info/?l=bugtraq&m=102397955217618&w=2 http://online.securityfocus.com/archive/1/276848 http://www.iss.net/security_center/static/9247.php http://www.kb.cert.org/vuls/id/440275 http://www.pivx.com/workaround_fail.html http://www.securityfocus.com/bid/4930 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-027 https://oval.cisecurity •