CVE-2000-0028 – Microsoft Internet Explorer 4/5/5.5/5.0.1 - external.NavigateAndFind() Cross-Frame
https://notcve.org/view.php?id=CVE-2000-0028
Internet Explorer 5.0 and 5.01 allows remote attackers to bypass the cross frame security policy and read files via the external.NavigateAndFind function. • https://www.exploit-db.com/exploits/19686 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0028 •
CVE-1999-0981 – Microsoft Internet Explorer 4/5 / Outlook 98 - 'window.open' Redirect
https://notcve.org/view.php?id=CVE-1999-0981
Internet Explorer 5.01 and earlier allows a remote attacker to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect." • https://www.exploit-db.com/exploits/19591 http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246094 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-050 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
CVE-1999-0858
https://notcve.org/view.php?id=CVE-1999-0858
Internet Explorer 5 allows a remote attacker to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247333 http://www.securityfocus.com/bid/846 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-054 • CWE-16: Configuration •
CVE-1999-0793 – Microsoft Internet Explorer 5.0/4.0.1 - JavaScript URL Redirection (MS99-043)
https://notcve.org/view.php?id=CVE-1999-0793
Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet. • https://www.exploit-db.com/exploits/19559 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-043 •
CVE-1999-1110 – Microsoft Internet Explorer 5 Media Player - ActiveX Error Message
https://notcve.org/view.php?id=CVE-1999-1110
Windows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code when a file does not exist, which allows remote malicious web sites to determine the existence of files on the client. • https://www.exploit-db.com/exploits/19618 http://www.securityfocus.com/archive/1/34675 http://www.securityfocus.com/bid/793 •