5.1
CVSSv2

CVE-2005-1988

Published: 10/08/2005 Updated: 23/07/2021
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 520
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

Unknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote malicious users to execute arbitrary code via a web site or an HTML e-mail containing a crafted JPEG image that causes memory corruption, aka "JPEG Image Rendering Memory Corruption Vulnerability".

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet explorer 5.01

microsoft internet explorer 5.5

microsoft ie 6

Exploits

<!-- placed into html for your testing /str0ke #!/usr/bin/perl ####################################################### # # Internet Explorer COM Objects Instantiation Proof of Concept Exploit (MS05-038) # # Bindshell on port 28876 - Based and ripped from Berend-Jan Wever's IE Exploit # # Vulnerable Objects : # # 3F8A6C33-E0FD-11D0-8A8C-00A0C ...
source: wwwsecurityfocuscom/bid/14282/info Microsoft Internet Explorer is prone to a buffer overflow vulnerability in the JPEG image rendering library used by the browser This issue is due to a failure of the application to properly bounds check input data prior to copying it to a fixed size memory buffer This issue was identified by c ...