CVE-2001-0089 – Microsoft Internet Explorer 5 - 'INPUT TYPE=FILE' Remote File Upload
https://notcve.org/view.php?id=CVE-2001-0089
Internet Explorer 5.0 through 5.5 allows remote attackers to read arbitrary files from the client via the INPUT TYPE element in an HTML form, aka the "File Upload via Form" vulnerability. • https://www.exploit-db.com/exploits/20459 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-093 https://exchange.xforce.ibmcloud.com/vulnerabilities/5615 •
CVE-2000-0982
https://notcve.org/view.php?id=CVE-2000-0982
Internet Explorer before 5.5 forwards cached user credentials for a secure web site to insecure pages on the same web site, which could allow remote attackers to obtain the credentials by monitoring connections to the web server, aka the "Cached Web Credentials" vulnerability. • http://www.acrossecurity.com/aspr/ASPR-2000-07-22-2-PUB.txt http://www.securityfocus.com/bid/1793 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-076 https://exchange.xforce.ibmcloud.com/vulnerabilities/5367 •
CVE-2000-0767
https://notcve.org/view.php?id=CVE-2000-0767
The ActiveX control for invoking a scriptlet in Internet Explorer 4.x and 5.x renders arbitrary file types instead of HTML, which allows an attacker to read arbitrary files, aka the "Scriptlet Rendering" vulnerability. • http://www.securityfocus.com/bid/1564 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-055 •
CVE-2000-0768
https://notcve.org/view.php?id=CVE-2000-0768
A function in Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files, aka a variant of the "Frame Domain Verification" vulnerability. • http://www.securityfocus.com/bid/1564 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-055 •
CVE-2000-0662
https://notcve.org/view.php?id=CVE-2000-0662
Internet Explorer 5.x and Microsoft Outlook allows remote attackers to read arbitrary files by redirecting the contents of an IFRAME using the DHTML Edit Control (DHTMLED). • http://www.securityfocus.com/bid/1474 http://www.securityfocus.com/templates/archive.pike?list=1&msg=396EF9D5.62EEC625%40nat.bg https://exchange.xforce.ibmcloud.com/vulnerabilities/5107 •