Show filters
22 Total Results
Displaying 11-20 of 22
Sort by:
Attacker Value
Unknown
CVE-2007-4848
Disclosure Date: September 12, 2007 (last updated October 04, 2023)
Microsoft Internet Explorer 4.0 through 7 allows remote attackers to determine the existence of local files that have associated images via a res:// URI in the src property of a JavaScript Image object, as demonstrated by the URI for a bitmap image resource within a (1) .exe or (2) .dll file.
0
Attacker Value
Unknown
CVE-2007-0018
Disclosure Date: January 24, 2007 (last updated October 04, 2023)
Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote attackers to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NCTAudioStudio, NCTAudioEditor, and NCTDialogicVoice; (2) Magic Audio Recorder, Music Editor, and Audio Converter; (3) Aurora Media Workshop; DB Audio Mixer And Editor; (4) J. Hepple Products including Fx Audio Editor and others; (5) EXPStudio Audio Editor; (6) iMesh; (7) Quikscribe; (8) RMBSoft AudioConvert and SoundEdit Pro 2.1; (9) CDBurnerXP; (10) Code-it Software Wave MP3 Editor and aBasic Editor; (11) Movavi VideoMessage, DVD to iPod, and others; (12) SoftDiv Software Dexster, iVideoMAX, and others; (13) Sienzo Digital Music Mentor (DMM); (14) MP3 Normalizer; (15) Roemer Software FREE and Easy Hi-Q Recorder, and Easy Hi-Q Converter; (16) Audio Edit Magic; (17) Joshua Video and Audio Converter; (18) Virtual CD; (…
0
Attacker Value
Unknown
CVE-2006-2607
Disclosure Date: May 25, 2006 (last updated October 04, 2023)
do_command.c in Vixie cron (vixie-cron) 4.1 does not check the return code of a setuid call, which might allow local users to gain root privileges if setuid fails in cases such as PAM failures or resource limits, as originally demonstrated by a program that exceeds the process limits as defined in /etc/security/limits.conf.
0
Attacker Value
Unknown
CVE-2005-1038
Disclosure Date: May 02, 2005 (last updated February 22, 2025)
crontab in Vixie cron 4.1, when running with the -e option, allows local users to read the cron files of other users by changing the file being edited to a symlink. NOTE: there is insufficient information to know whether this is a duplicate of CVE-2001-0235.
0
Attacker Value
Unknown
CVE-2001-1497
Disclosure Date: December 31, 2001 (last updated February 22, 2025)
Microsoft Internet Explorer 4.0 through 6.0 could allow local users to differentiate between alphanumeric and non-alphanumeric characters used in a password by pressing certain control keys that jump between non-alphanumeric characters, which makes it easier to conduct a brute-force password guessing attack.
0
Attacker Value
Unknown
CVE-2000-0162
Disclosure Date: February 18, 2000 (last updated February 22, 2025)
The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability.
0
Attacker Value
Unknown
CVE-1999-0876
Disclosure Date: January 04, 2000 (last updated February 22, 2025)
Buffer overflow in Internet Explorer 4.0 via EMBED tag.
0
Attacker Value
Unknown
CVE-2000-0028
Disclosure Date: December 23, 1999 (last updated February 22, 2025)
Internet Explorer 5.0 and 5.01 allows remote attackers to bypass the cross frame security policy and read files via the external.NavigateAndFind function.
0
Attacker Value
Unknown
CVE-2000-0329
Disclosure Date: November 11, 1999 (last updated February 22, 2025)
A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.
0
Attacker Value
Unknown
CVE-1999-0827
Disclosure Date: November 01, 1999 (last updated February 22, 2025)
By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing.
0