Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption.
2006-04-11T23:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 10.0 (HIGH)
AV:N/AC:L/Au:N/C:C/I:C/A:C
10.0
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | microsoft | ie | 5.0.1 | Yes |
Application | microsoft | ie | 5.0.1 | Yes |
Application | microsoft | ie | 5.0.1 | Yes |
Application | microsoft | ie | 5.0.1 | Yes |
Application | microsoft | ie | 5.01 | Yes |
Application | microsoft | ie | 6 | Yes |
Application | microsoft | internet_explorer | 5.0.1 | Yes |
Application | microsoft | internet_explorer | 5.0.1 | Yes |
Application | microsoft | internet_explorer | 5.0.1 | Yes |
Application | microsoft | internet_explorer | 5.0.1 | Yes |
Application | microsoft | internet_explorer | 5.0.1 | Yes |
Application | microsoft | internet_explorer | 5.01 | Yes |
Application | microsoft | internet_explorer | 5.1 | Yes |
Application | microsoft | internet_explorer | 5.01 | Yes |
Application | microsoft | internet_explorer | 5.01 | Yes |
Application | microsoft | internet_explorer | 5.01 | Yes |
Application | microsoft | internet_explorer | 5.01 | Yes |
Application | microsoft | internet_explorer | 5.5 | Yes |
Application | microsoft | internet_explorer | 5.5 | Yes |
Application | microsoft | internet_explorer | 5.5 | Yes |
Application | microsoft | internet_explorer | 5.5 | Yes |