Page 4 of 46 results (0.003 seconds)

CVSS: 5.0EPSS: 18%CPEs: 2EXPL: 0

24 May 2001 — Internet Explorer 5.5 and earlier does not properly verify the domain of a frame within a browser window, which allows remote web site operators to read certain files on the client by sending information from a local frame to a frame in a different domain, aka a variant of the "Frame Domain Verification" vulnerability. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-027 •

CVSS: 9.8EPSS: 14%CPEs: 4EXPL: 0

07 May 2001 — Internet Explorer 5.5 and earlier allows remote attackers to obtain the physical location of cached content and open the content in the Local Computer Zone, then use compiled HTML help (.chm) files to execute arbitrary programs. • http://www.guninski.com/chmtempmain.html •

CVSS: 7.5EPSS: 40%CPEs: 1EXPL: 2

07 May 2001 — Windows Scripting Host in Internet Explorer 5.5 and earlier allows remote attackers to read arbitrary files via the GetObject Javascript function and the htmlfile ActiveX object. • https://www.exploit-db.com/exploits/20243 •

CVSS: 9.8EPSS: 11%CPEs: 1EXPL: 1

07 May 2001 — Internet Explorer 5.5 and earlier executes Telnet sessions using command line arguments that are specified by the web site, which could allow remote attackers to execute arbitrary commands if the IE client is using the Telnet client provided in Services for Unix (SFU) 2.0, which creates session transcripts. • https://www.exploit-db.com/exploits/20680 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 8.1EPSS: 13%CPEs: 2EXPL: 0

03 May 2001 — HTML e-mail feature in Internet Explorer 5.5 and earlier allows attackers to execute attachments by setting an unusual MIME type for the attachment, which Internet Explorer does not process correctly. Funcionalidad HTML en Internet Explorer 5.5 y anteriores, que permite al atacante la ejecución de un archivo adjunto. Se consigue gracias al envío de cabeceras MIME inválidas para el adjunto que le permiten disfrazarse como un tipo de archivo no ejecutable. El correo electrónico vía HTML se representa en págin... • http://marc.info/?l=bugtraq&m=98596775905044&w=2 •

CVSS: 7.5EPSS: 40%CPEs: 3EXPL: 1

16 Feb 2001 — Internet Explorer 5.0 through 5.5 allows remote attackers to read arbitrary files from the client via the INPUT TYPE element in an HTML form, aka the "File Upload via Form" vulnerability. • https://www.exploit-db.com/exploits/20459 •

CVSS: 4.3EPSS: 14%CPEs: 6EXPL: 0

11 May 2000 — Internet Explorer 4.0 and 5.0 allows a malicious web site to obtain client cookies from another domain by including that domain name and escaped characters in a URL, aka the "Unauthorized Cookie Access" vulnerability. • http://www.osvdb.org/1326 •

CVSS: 8.8EPSS: 6%CPEs: 3EXPL: 0

31 Dec 1999 — Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page. • http://support.microsoft.com/support/kb/articles/q191/2/00.asp •

CVSS: 9.8EPSS: 6%CPEs: 1EXPL: 0

31 Dec 1999 — Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue." • http://marc.info/?l=bugtraq&m=88480839506155&w=2 •

CVSS: 6.1EPSS: 16%CPEs: 2EXPL: 0

31 Dec 1999 — When a Web site redirects the browser to another site, Internet Explorer 3.02 and 4.0 automatically resends authentication information to the second site, aka the "Page Redirect Issue." • http://support.microsoft.com/support/kb/articles/q176/6/97.asp •