Page 88 of 588 results (0.009 seconds)

CVSS: 7.5EPSS: 88%CPEs: 1EXPL: 2

Buffer overflow in the IsComponentInstalled method in Internet Explorer 6.0, when used on Windows 2000 before SP4 or Windows XP before SP1, allows remote attackers to execute arbitrary code via JavaScript that calls IsComponentInstalled with a long first argument. • https://www.exploit-db.com/exploits/16549 http://metasploit.com/projects/Framework/exploits.html#ie_iscomponentinstalled http://www.metasploit.com/projects/Framework/modules/exploits/ie_iscomponentinstalled.pm http://www.securityfocus.com/bid/16870 https://exchange.xforce.ibmcloud.com/vulnerabilities/24923 •

CVSS: 7.5EPSS: 5%CPEs: 1EXPL: 0

The scripting engine in Internet Explorer allows remote attackers to cause a denial of service (resource consumption) and possibly execute arbitrary code via a web page that contains a recurrent call to an infinite loop in Javascript or VBscript, which consumes the stack, as demonstrated by resetting the "location" variable within the loop. • http://www.securityfocus.com/archive/1/425283/100/0/threaded http://www.securityfocus.com/archive/1/425378/100/0/threaded http://www.securityfocus.com/bid/16687 https://exchange.xforce.ibmcloud.com/vulnerabilities/24788 •

CVSS: 4.0EPSS: 5%CPEs: 1EXPL: 0

Microsoft Internet Explorer allows remote attackers to spoof a legitimate URL in the status bar and conduct a phishing attack via a web page with an anchor element with a legitimate "href" attribute, a form whose action points to a malicious URL, and an INPUT submit element that is modified to look like a legitimate URL. NOTE: this issue is very similar to CVE-2004-1104, although the manipulations are slightly different. • http://www.osvdb.org/23609 http://www.securityfocus.com/archive/1/425298/100/0/threaded http://www.securityfocus.com/archive/1/425386/100/0/threaded http://www.securityfocus.com/archive/1/425883/100/0/threaded https://exchange.xforce.ibmcloud.com/vulnerabilities/17938 •

CVSS: 7.1EPSS: 0%CPEs: 1EXPL: 0

The CLSID_ApprenticeICW control allows remote attackers to cause a denial of service (Internet Explorer crash) by creating a COM object of the class associated with the control's CLSID, which is not intended for use within Internet Explorer. • http://www.securityfocus.com/archive/1/391803 •

CVSS: 7.5EPSS: 14%CPEs: 29EXPL: 1

Internet Explorer 6.0, and possibly other versions, allows remote attackers to bypass the same origin security policy and make requests outside of the intended domain by calling open on an XMLHttpRequest object (Microsoft.XMLHTTP) and using tab, newline, and carriage return characters within the first argument (method name), which is supported by some proxy servers that convert tabs to spaces. NOTE: this issue can be leveraged to conduct referer spoofing, HTTP Request Smuggling, and other attacks. • http://seclists.org/fulldisclosure/2007/Feb/0081.html http://www.securityfocus.com/archive/1/411585 http://www.securityfocus.com/archive/1/459172/100/0/threaded http://www.securityfocus.com/bid/14969 •