![](/assets/img/cve_300x82_sin_bg.png)
CVE-2000-0156 – Microsoft Internet Explorer 4.0/4.0.1/5.0/5.0.1/5.5 - preview Security Zone Settings Lag
https://notcve.org/view.php?id=CVE-2000-0156
16 Feb 2000 — Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the "Image Source Redirect" vulnerability. • https://www.exploit-db.com/exploits/19719 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2000-0061 – Microsoft Internet Explorer 4.0/4.0.1/5.0/5.0.1/5.5 - preview Security Zone Settings Lag
https://notcve.org/view.php?id=CVE-2000-0061
07 Jan 2000 — Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading. • https://www.exploit-db.com/exploits/19719 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-1999-0876
https://notcve.org/view.php?id=CVE-1999-0876
04 Jan 2000 — Buffer overflow in Internet Explorer 4.0 via EMBED tag. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ185959 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-1999-1087
https://notcve.org/view.php?id=CVE-1999-1087
31 Dec 1999 — Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server. • http://support.microsoft.com/support/kb/articles/q168/6/17.asp •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-1999-1093
https://notcve.org/view.php?id=CVE-1999-1093
31 Dec 1999 — Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page. • http://support.microsoft.com/support/kb/articles/q191/2/00.asp •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-1999-1094
https://notcve.org/view.php?id=CVE-1999-1094
31 Dec 1999 — Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue." • http://marc.info/?l=bugtraq&m=88480839506155&w=2 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2000-0028 – Microsoft Internet Explorer 4/5/5.5/5.0.1 - external.NavigateAndFind() Cross-Frame
https://notcve.org/view.php?id=CVE-2000-0028
23 Dec 1999 — Internet Explorer 5.0 and 5.01 allows remote attackers to bypass the cross frame security policy and read files via the external.NavigateAndFind function. • https://www.exploit-db.com/exploits/19686 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-1999-0981 – Microsoft Internet Explorer 4/5 / Outlook 98 - 'window.open' Redirect
https://notcve.org/view.php?id=CVE-1999-0981
08 Dec 1999 — Internet Explorer 5.01 and earlier allows a remote attacker to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect." • https://www.exploit-db.com/exploits/19591 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-1999-0793 – Microsoft Internet Explorer 5.0/4.0.1 - JavaScript URL Redirection (MS99-043)
https://notcve.org/view.php?id=CVE-1999-0793
17 Nov 1999 — Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet. • https://www.exploit-db.com/exploits/19559 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2000-0329 – Microsoft Internet Explorer 4.x/5 / Outlook 2000 0/98 0/Express 4.x - ActiveX '.CAB' File Execution
https://notcve.org/view.php?id=CVE-2000-0329
11 Nov 1999 — A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability. • https://www.exploit-db.com/exploits/19603 •