Show filters
139 Total Results
Displaying 81-90 of 139
Sort by:
Attacker Value
Unknown

CVE-2004-1155

Disclosure Date: December 31, 2004 (last updated February 22, 2025)
Internet Explorer 5.01 through 6 allows remote attackers to spoof arbitrary web sites by injecting content from one window into another window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability. NOTE: later research shows that Internet Explorer 7 on Windows XP SP2 is also vulnerable.
0
Attacker Value
Unknown

CVE-2004-0841

Disclosure Date: December 23, 2004 (last updated February 22, 2025)
Internet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."
0
Attacker Value
Unknown

CVE-2004-0842

Disclosure Date: December 23, 2004 (last updated February 22, 2025)
Internet Explorer 6.0 SP1 and earlier, and possibly other versions, allows remote attackers to cause a denial of service (application crash from "memory corruption") via certain malformed Cascading Style Sheet (CSS) elements that trigger heap-based buffer overflows, as demonstrated using the "<STYLE>@;/*" string, possibly due to a missing comment terminator that may cause an invalid length to trigger a large memory copy operation, aka the "CSS Heap Memory Corruption Vulnerability."
0
Attacker Value
Unknown

CVE-2004-0845

Disclosure Date: November 03, 2004 (last updated February 22, 2025)
Internet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote attackers to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web site.
0
Attacker Value
Unknown

CVE-2004-0843

Disclosure Date: November 03, 2004 (last updated February 22, 2025)
Internet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote attackers to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability."
0
Attacker Value
Unknown

CVE-2004-0216

Disclosure Date: November 03, 2004 (last updated February 22, 2025)
Integer overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow.
0
Attacker Value
Unknown

CVE-2004-0839

Disclosure Date: August 18, 2004 (last updated February 22, 2025)
Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, as demonstrated by "wottapoop.html".
0
Attacker Value
Unknown

CVE-2004-0526

Disclosure Date: August 06, 2004 (last updated February 22, 2025)
Unknown versions of Internet Explorer and Outlook allow remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
0
Attacker Value
Unknown

CVE-2004-0719

Disclosure Date: July 27, 2004 (last updated February 22, 2025)
Internet Explorer for Mac 5.2.3, Internet Explorer 6 on Windows XP, and possibly other versions, does not properly prevent a frame in one domain from injecting content into a frame that belongs to another domain, which facilitates web site spoofing and other attacks, aka the frame injection vulnerability.
0
Attacker Value
Unknown

CVE-2003-1041

Disclosure Date: June 14, 2004 (last updated February 22, 2025)
Internet Explorer 5.x and 6.0 allows remote attackers to execute arbitrary programs via a modified directory traversal attack using a URL containing ".." (dot dot) sequences and a filename that ends in "::" which is treated as a .chm file even if it does not have a .chm extension. NOTE: this bug may overlap CVE-2004-0475.
0