Page 6 of 30 results (0.010 seconds)

CVSS: 7.6EPSS: 0%CPEs: 3EXPL: 0

The Microsoft Active Setup ActiveX component in Internet Explorer 4.x and 5.x allows a remote attacker to install software components without prompting the user by stating that the software's manufacturer is Microsoft. • http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=20000221103938.T21312%40securityfocus.com •

CVSS: 5.1EPSS: 0%CPEs: 9EXPL: 0

The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-011 •

CVSS: 7.5EPSS: 12%CPEs: 3EXPL: 1

Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote attackers to execute commands via the vnd.ms.radio protocol. • https://www.exploit-db.com/exploits/19665 http://www.securityfocus.com/bid/861 •

CVSS: 7.2EPSS: 0%CPEs: 3EXPL: 0

Windows NT Task Scheduler installed with Internet Explorer 5 allows a user to gain privileges by modifying the job after it has been scheduled. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246972 http://www.securityfocus.com/bid/828 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-051 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.1EPSS: 1%CPEs: 20EXPL: 1

A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability. • https://www.exploit-db.com/exploits/19603 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-048 •