Lucene search

K
exploitdbFelineMenaceEDB-ID:22726
HistoryJun 04, 2003 - 12:00 a.m.

Microsoft Internet Explorer 5 - OBJECT Tag Buffer Overflow

2003-06-0400:00:00
FelineMenace
www.exploit-db.com
15

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/7806/info

Microsoft Internet Explorer is prone to a boundary condition error when handling OBJECT tags in web pages. When a web page containing an OBJECT tag using a parameter containing excessive data is encountered by a vulnerable client, a internal memory buffer will be overrun. This could cause Internet Explorer to fail or potentially result in the execution arbitrary code in the security context of the current user.

https://gitlab.com/exploit-database/exploitdb-bin-sploits/-/raw/main/bin-sploits/22726.tar