Page 45 of 225 results (0.041 seconds)

CVSS: 2.6EPSS: 0%CPEs: 9EXPL: 0

A function in Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files, aka a variant of the "Frame Domain Verification" vulnerability. • http://www.securityfocus.com/bid/1564 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-055 •

CVSS: 5.0EPSS: 2%CPEs: 2EXPL: 0

Internet Explorer 5.x and Microsoft Outlook allows remote attackers to read arbitrary files by redirecting the contents of an IFRAME using the DHTML Edit Control (DHTMLED). • http://www.securityfocus.com/bid/1474 http://www.securityfocus.com/templates/archive.pike?list=1&msg=396EF9D5.62EEC625%40nat.bg https://exchange.xforce.ibmcloud.com/vulnerabilities/5107 •

CVSS: 2.6EPSS: 0%CPEs: 4EXPL: 0

The IFRAME of the WebBrowser control in Internet Explorer 5.01 allows a remote attacker to violate the cross frame security policy via the NavigateComplete2 event. • http://archives.neohapsis.com/archives/win2ksecadvice/2000-q2/0154.html http://www.securityfocus.com/bid/1311 •

CVSS: 5.1EPSS: 63%CPEs: 4EXPL: 1

Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files via the frame, aka the "Frame Domain Verification" vulnerability. • https://www.exploit-db.com/exploits/19939 http://www.microsoft.com/technet/support/kb.asp?ID=251108 http://www.microsoft.com/technet/support/kb.asp?ID=255676 http://www.securityfocus.com/bid/1224 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-033 •

CVSS: 10.0EPSS: 1%CPEs: 5EXPL: 1

Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading. • https://www.exploit-db.com/exploits/19719 http://www.securityfocus.com/bid/923 •