Page 61 of 324 results (0.010 seconds)

CVSS: 4.0EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands. • http://ciac.llnl.gov/ciac/bulletins/j-064.shtml https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 2

Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell. • https://www.exploit-db.com/exploits/19471 http://marc.info/?l=ntbugtraq&m=93578772920970&w=2 http://www.securityfocus.com/bid/606 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Internet Explorer 5.0 records the username and password for FTP servers in the URL history, which could allow (1) local users to read the information from another user's index.dat, or (2) people who are physically observing ("shoulder surfing") another user to read the information from the status bar when the user moves the mouse over a link. • https://www.exploit-db.com/exploits/19473 http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=ind9904&L=NTBUGTRAQ&P=R179 http://packetderm.cotse.com/mailing-lists/ntbugtraq/1999/0364.html https://exchange.xforce.ibmcloud.com/vulnerabilities/3289 •

CVSS: 5.1EPSS: 38%CPEs: 2EXPL: 1

The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. • https://www.exploit-db.com/exploits/19468 http://ciac.llnl.gov/ciac/bulletins/j-064.shtml http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ240308 http://www.securityfocus.com/bid/598 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 •

CVSS: 5.1EPSS: 0%CPEs: 2EXPL: 0

The Preloader ActiveX control used by Internet Explorer allows remote attackers to read arbitrary files. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231452 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-018 •