Show filters
54 Total Results
Displaying 21-30 of 54
Sort by:
Attacker Value
Unknown

CVE-2004-1155

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Internet Explorer 5.01 through 6 allows remote attackers to spoof arbitrary web sites by injecting content from one window into another window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability. NOTE: later research shows that Internet Explorer 7 on Windows XP SP2 is also vulnerable.
0
Attacker Value
Unknown

CVE-2004-0841

Disclosure Date: December 23, 2004 (last updated February 22, 2025)
Internet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."
0
Attacker Value
Unknown

CVE-2004-0842

Disclosure Date: December 23, 2004 (last updated February 22, 2025)
Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."
0
Attacker Value
Unknown

CVE-2004-0839

Disclosure Date: August 18, 2004 (last updated February 22, 2025)
Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".
0
Attacker Value
Unknown

CVE-2004-0526

Disclosure Date: August 06, 2004 (last updated February 22, 2025)
Unknown versions of Internet Explorer and Outlook allow remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
0
Attacker Value
Unknown

CVE-2004-0719

Disclosure Date: July 27, 2004 (last updated February 22, 2025)
Internet Explorer for Mac 5.2.3, Internet Explorer 6 on Windows XP, and possibly other versions, does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
0
Attacker Value
Unknown

CVE-2003-0513

Disclosure Date: April 15, 2004 (last updated February 22, 2025)
Microsoft Internet Explorer allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Internet Explorer to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.
0
Attacker Value
Unknown

CVE-2004-2090

Disclosure Date: February 07, 2004 (last updated February 22, 2025)
Microsoft Internet Explorer 5.0.1 through 6.0 allows remote attackers to determine the existence of arbitrary files via the VBScript LoadPicture method, which returns an error code if the file does not exist.
0
Attacker Value
Unknown

CVE-2003-0817

Disclosure Date: February 03, 2004 (last updated February 22, 2025)
Internet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.
0
Attacker Value
Unknown

CVE-2003-0816

Disclosure Date: February 03, 2004 (last updated February 22, 2025)
Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.
0