CVE-1999-1473
https://notcve.org/view.php?id=CVE-1999-1473
When a Web site redirects the browser to another site, Internet Explorer 3.02 and 4.0 automatically resends authentication information to the second site, aka the "Page Redirect Issue." • http://support.microsoft.com/support/kb/articles/q176/6/97.asp http://www.iss.net/security_center/static/7426.php http://www.osvdb.org/7818 •
CVE-2000-0028 – Microsoft Internet Explorer 4/5/5.5/5.0.1 - external.NavigateAndFind() Cross-Frame
https://notcve.org/view.php?id=CVE-2000-0028
Internet Explorer 5.0 and 5.01 allows remote attackers to bypass the cross frame security policy and read files via the external.NavigateAndFind function. • https://www.exploit-db.com/exploits/19686 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0028 •
CVE-1999-0981 – Microsoft Internet Explorer 4/5 / Outlook 98 - 'window.open' Redirect
https://notcve.org/view.php?id=CVE-1999-0981
Internet Explorer 5.01 and earlier allows a remote attacker to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect." • https://www.exploit-db.com/exploits/19591 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246094 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-050 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-1999-0858
https://notcve.org/view.php?id=CVE-1999-0858
Internet Explorer 5 allows a remote attacker to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247333 http://www.securityfocus.com/bid/846 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-054 • CWE-16: Configuration •
CVE-1999-0793 – Microsoft Internet Explorer 5.0/4.0.1 - JavaScript URL Redirection (MS99-043)
https://notcve.org/view.php?id=CVE-1999-0793
Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet. • https://www.exploit-db.com/exploits/19559 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-043 •