Page 52 of 292 results (0.003 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Internet Explorer 5 allows a remote attacker to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247333 http://www.securityfocus.com/bid/846 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-054 • CWE-16: Configuration •

CVSS: 2.6EPSS: 1%CPEs: 2EXPL: 1

Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet. • https://www.exploit-db.com/exploits/19559 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-043 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 3

Windows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code when a file does not exist, which allows remote malicious web sites to determine the existence of files on the client. • https://www.exploit-db.com/exploits/19618 http://www.securityfocus.com/archive/1/34675 http://www.securityfocus.com/bid/793 •

CVSS: 5.1EPSS: 1%CPEs: 20EXPL: 1

A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability. • https://www.exploit-db.com/exploits/19603 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-048 •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Internet Explorer 4.x or 5.x with Word 97 allows arbitrary execution of Visual Basic programs to the IE client through the Word 97 template, which doesn't warn the user that the template contains executable content. Also applies to Outlook when the client views a malicious email message. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-002 •