Microsoft » Internet Explorer » 5.5 sp2 : Security Vulnerabilities, CVEs, Published In 2004 (Code Execution)
Microsoft Windows Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code via an embedded script that uses Shell Helper objects and a shortcut (link) to execute the target script.
Max CVSS
7.5
EPSS Score
24.15%
Published
2004-12-31
Updated
2021-07-23
Integer overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value.
Max CVSS
7.5
EPSS Score
72.05%
Published
2004-07-27
Updated
2021-07-23
The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.
Max CVSS
10.0
EPSS Score
96.43%
Published
2004-08-06
Updated
2021-07-23
Integer overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.
Max CVSS
10.0
EPSS Score
87.81%
Published
2004-11-03
Updated
2021-07-23
4 vulnerabilities found