Show filters
304 Total Results
Displaying 151-160 of 304
Sort by:
Attacker Value
Unknown

CVE-2004-0549

Disclosure Date: August 06, 2004 (last updated February 22, 2025)
The WebBrowser ActiveX control, or the Internet Explorer HTML rendering engine (MSHTML), as used in Internet Explorer 6, allows remote attackers to execute arbitrary code in the Local Security context by using the showModalDialog method and modifying the location to execute code such as Javascript, as demonstrated using (1) delayed HTTP redirect operations, and an HTTP response with a Location: header containing a "URL:" prepended to a "ms-its" protocol URI, or (2) modifying the location attribute of the window, as exploited by the Download.ject (aka Scob aka Toofer) using the ADODB.Stream object.
0
Attacker Value
Unknown

CVE-2003-1048

Disclosure Date: July 27, 2004 (last updated February 22, 2025)
Double free vulnerability in mshtml.dll for certain versions of Internet Explorer 6.x allows remote attackers to cause a denial of service (application crash) via a malformed GIF image.
Attacker Value
Unknown

CVE-2004-0566

Disclosure Date: July 27, 2004 (last updated February 22, 2025)
Integer overflow in imgbmp.cxx for Windows 2000 allows remote attackers to execute arbitrary code via a BMP image with a large bfOffBits value.
0
Attacker Value
Unknown

CVE-2004-0719

Disclosure Date: July 27, 2004 (last updated February 22, 2025)
Internet Explorer for Mac 5.2.3, Internet Explorer 6 on Windows XP, and possibly other versions, does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
0
Attacker Value
Unknown

CVE-2003-1041

Disclosure Date: June 14, 2004 (last updated February 22, 2025)
Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475.
0
Attacker Value
Unknown

CVE-2003-0513

Disclosure Date: April 15, 2004 (last updated February 22, 2025)
Microsoft Internet Explorer allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Internet Explorer to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
0
Attacker Value
Unknown

CVE-2004-1922

Disclosure Date: April 11, 2004 (last updated February 22, 2025)
Microsoft Internet Explorer 5.5 and 6.0 allocates memory based on the memory size written in the BMP file instead of the actual BMP file size, which allows remote attackers to cause a denial of service (memory consumption) via a small BMP file with has a large memory size.
0
Attacker Value
Unknown

CVE-2004-2090

Disclosure Date: February 07, 2004 (last updated February 22, 2025)
Microsoft Internet Explorer 5.0.1 through 6.0 allows remote attackers to determine the existence of arbitrary files via the VBScript LoadPicture method, which returns an error code if the file does not exist.
0
Attacker Value
Unknown

CVE-2003-0817

Disclosure Date: February 03, 2004 (last updated February 22, 2025)
Internet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.
0
Attacker Value
Unknown

CVE-2003-0816

Disclosure Date: February 03, 2004 (last updated February 22, 2025)
Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.
0