Page 50 of 292 results (0.004 seconds)

CVSS: 5.1EPSS: 0%CPEs: 4EXPL: 1

Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the "Image Source Redirect" vulnerability. • https://www.exploit-db.com/exploits/19719 http://www.osvdb.org/7827 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-009 https://exchange.xforce.ibmcloud.com/vulnerabilities/3996 •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 1

Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading. • https://www.exploit-db.com/exploits/19719 http://www.securityfocus.com/bid/923 •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 0

Buffer overflow in Internet Explorer 4.0 via EMBED tag. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ185959 http://support.microsoft.com/support/kb/articles/q176/6/97.asp • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server. • http://support.microsoft.com/support/kb/articles/q168/6/17.asp http://www.microsoft.com/Windows/Ie/security/dotless.asp http://www.osvdb.org/7828 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-016 https://exchange.xforce.ibmcloud.com/vulnerabilities/2209 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue." • http://marc.info/?l=bugtraq&m=88480839506155&w=2 http://support.microsoft.com/support/kb/articles/q176/6/97.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/917 •