
CVE-2004-1173
https://notcve.org/view.php?id=CVE-2004-1173
15 Dec 2004 — Internet Explorer 6 allows remote attackers to bypass the popup blocker via the document object model (DOM) methods in the DHTML Dynamic HTML (DHTML) Editing Component (DEC) and Javascript that calls showModalDialog. • http://marc.info/?l=bugtraq&m=110271114525795&w=2 •

CVE-2004-1155
https://notcve.org/view.php?id=CVE-2004-1155
10 Dec 2004 — Internet Explorer 5.01 through 6 allows remote attackers to spoof arbitrary web sites by injecting content from one window into another window whose name is known but resides in a different domain, as demonstrated using a pop-up window on a trusted web site, aka the "window injection" vulnerability. NOTE: later research shows that Internet Explorer 7 on Windows XP SP2 is also vulnerable. • http://secunia.com/advisories/13251 •

CVE-2004-1166 – Microsoft Internet Explorer 5.0.1 - FTP URI Arbitrary FTP Server Command Execution
https://notcve.org/view.php?id=CVE-2004-1166
10 Dec 2004 — CRLF injection vulnerability in Microsoft Internet Explorer 6.0.2800.1106 and earlier allows remote attackers to execute arbitrary FTP commands via an ftp:// URL that contains a URL-encoded newline ("%0a") before the FTP command, which causes the commands to be inserted into the resulting FTP session, as demonstrated using a PORT command. • https://www.exploit-db.com/exploits/24800 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2004-1050 – Microsoft Internet Explorer 6 - IFRAME Tag Buffer Overflow
https://notcve.org/view.php?id=CVE-2004-1050
18 Nov 2004 — Heap-based buffer overflow in Internet Explorer 6 allows remote attackers to execute arbitrary code via long (1) SRC or (2) NAME attributes in IFRAME, FRAME, and EMBED elements, as originally discovered using the mangleme utility, aka "the IFRAME vulnerability" or the "HTML Elements Vulnerability." • https://www.exploit-db.com/exploits/612 •

CVE-2004-1331
https://notcve.org/view.php?id=CVE-2004-1331
16 Nov 2004 — The execCommand method in Microsoft Internet Explorer 6.0 SP2 allows remote attackers to bypass the "File Download - Security Warning" dialog and save arbitrary files with arbitrary extensions via the SaveAs command. • http://archives.neohapsis.com/archives/bugtraq/2004-11/0260.html •

CVE-2004-0978
https://notcve.org/view.php?id=CVE-2004-0978
21 Oct 2004 — Heap-based buffer overflow in the Hrtbeat.ocx (Heartbeat) ActiveX control for Internet Explorer 5.01 through 6, when users who visit online gaming sites that are associated with MSN, allows remote attackers to execute arbitrary code via the SetupData parameter. • http://marc.info/?l=bugtraq&m=110616221411579&w=2 • CWE-787: Out-of-bounds Write •

CVE-2004-0979
https://notcve.org/view.php?id=CVE-2004-0979
21 Oct 2004 — Internet Explorer on Windows XP does not properly modify the "Drag and Drop or copy and paste files" setting when the user sets it to "Disable" or "Prompt," which may enable security-sensitive operations that are inconsistent with the user's intended configuration. • http://www.kb.cert.org/vuls/id/630720 •

CVE-2004-0845
https://notcve.org/view.php?id=CVE-2004-0845
16 Oct 2004 — Internet Explorer 5.01, 5.5, and 6 does not properly cache SSL content, which allows remote attackers to obtain information or spoof content via a web site with the same host name as the target web site, whose content is cached and reused when the user visits the target web site. Internet Explorer 5.01, 5.5, y 6 no hace caché adecuadamente de contenido SSL, lo que permite a atacantes remotos obtener información o suplantar contenido mediante un sitio web con el mismo nombre de máquina como el sitio web obje... • http://marc.info/?l=bugtraq&m=109770364504803&w=2 •

CVE-2004-0843
https://notcve.org/view.php?id=CVE-2004-0843
16 Oct 2004 — Internet Explorer 5.5 and 6 does not properly handle plug-in navigation, which allows remote attackers to alter displayed address bars and thereby spoof web pages, facilitating phishing attacks, aka the "Plug-in Navigation Address Bar Spoofing Vulnerability." Internet Explorer 5.5 y 6 no manejan adecuadamente la navegación con complementos (plug-in), lo que permite a atacantes remotos alterar la barra de navegación mostrada y suplantar páginas web, facilitando ataques de "phising", también conocida como "Vu... • http://www.kb.cert.org/vuls/id/625616 •

CVE-2004-0216
https://notcve.org/view.php?id=CVE-2004-0216
16 Oct 2004 — Integer overflow in the Install Engine (inseng.dll) for Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via a malicious website or HTML email with a long .CAB file name, which triggers the integer overflow when calculating a buffer length and leads to a heap-based buffer overflow. Desbordamiento de búfer en el Motor de Instalación (inseng.dll) de Internet Explorer 5.01, 5.5 y 6 permite a atacantes remotos ejecutar código de su elección mediante un sitio web maliciosos o ... • http://marc.info/?l=bugtraq&m=109760693512754&w=2 •