Description
Microsoft Virtual Machine (VM) in Internet Explorer 4.x and 5.x allows an unsigned applet to create and use ActiveX controls, which allows a remote attacker to bypass Internet Explorer's security settings and execute arbitrary commands via a malicious web page or email, aka the "Microsoft VM ActiveX Component" vulnerability.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Marcin Jackowski · textremotewindows
https://www.exploit-db.com/exploits/20266
References (2)
Core 2
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/5127
Vendor Advisory vendor-advisory
x_refsource_ms
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-075
Scores
EPSS
0.1512
EPSS Percentile
94.7%
Details
Status
published
Products (2)
microsoft/ie
4.x
microsoft/ie
5.x
Published
Dec 11, 2000
Tracked Since
Feb 18, 2026