Page 55 of 292 results (0.005 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Internet Explorer 5.0 records the username and password for FTP servers in the URL history, which could allow (1) local users to read the information from another user's index.dat, or (2) people who are physically observing ("shoulder surfing") another user to read the information from the status bar when the user moves the mouse over a link. • https://www.exploit-db.com/exploits/19473 http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=ind9904&L=NTBUGTRAQ&P=R179 http://packetderm.cotse.com/mailing-lists/ntbugtraq/1999/0364.html https://exchange.xforce.ibmcloud.com/vulnerabilities/3289 •

CVSS: 5.1EPSS: 38%CPEs: 2EXPL: 1

The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. • https://www.exploit-db.com/exploits/19468 http://ciac.llnl.gov/ciac/bulletins/j-064.shtml http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ240308 http://www.securityfocus.com/bid/598 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 •

CVSS: 5.1EPSS: 0%CPEs: 2EXPL: 0

The Preloader ActiveX control used by Internet Explorer allows remote attackers to read arbitrary files. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231452 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-018 •

CVSS: 7.6EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in Internet Explorer 5 allows remote attackers to execute commands via a malformed Favorites icon. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231450 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-018 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 0

Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not use standard cache controls, which could allow users on the same system to access restricted web sites that were visited by other users. • http://www.pcworld.com/news/article/0%2Caid%2C10842%2C00.asp •