CVE-2004-1922
https://notcve.org/view.php?id=CVE-2004-1922
Microsoft Internet Explorer 5.5 and 6.0 allocates memory based on the memory size written in the BMP file instead of the actual BMP file size, which allows remote attackers to cause a denial of service (memory consumption) via a small BMP file with has a large memory size. • http://marc.info/?l=bugtraq&m=108183130827872&w=2 •
CVE-2004-0284
https://notcve.org/view.php?id=CVE-2004-0284
Microsoft Internet Explorer 6.0, Outlook 2002, and Outlook 2003 allow remote attackers to cause a denial of service (CPU consumption), if "Do not save encrypted pages to disk" is disabled, via a web site or HTML e-mail that contains two null characters (%00) after the host name. Microsoft Internet Explorer 6.0, Outlook 2002, y Outlook 2003 permiten a atacantes remotos causar una denegación de servicio (consumición de CPU) si está desactivado "No guardar las páginas cifradas en el disco), mediante un sitio web o un mensaje de correo electrónico que contenga dos caractéres nulos (%00) después del nombre de máquina. • http://marc.info/?l=bugtraq&m=107643134712133&w=2 http://www.securityfocus.com/bid/9629 https://exchange.xforce.ibmcloud.com/vulnerabilities/15127 •
CVE-2003-0513
https://notcve.org/view.php?id=CVE-2003-0513
Microsoft Internet Explorer allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Internet Explorer to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application. Microsoft Internet Explorer permite a atacantes remotos saltarse las restriciones de cookies pretendidas en una aplicación web mediante secuencias de atravesamiento de directorios "%2e%2e" (punto punto codificado) en una URL, lo que hace que Internet Explorer envíe la cookie fuera de los subconjuntos de URL especificados, por ejemplo a una aplicación vulnerable que corre en el mismo servidor que la aplicación objetivo. • http://archives.neohapsis.com/archives/vulnwatch/2004-q1/0056.html http://lists.grok.org.uk/pipermail/full-disclosure/2004-March/018475.html •
CVE-2004-2090 – Microsoft Internet Explorer 5.0.1 - LoadPicture File Enumeration
https://notcve.org/view.php?id=CVE-2004-2090
Microsoft Internet Explorer 5.0.1 through 6.0 allows remote attackers to determine the existence of arbitrary files via the VBScript LoadPicture method, which returns an error code if the file does not exist. • https://www.exploit-db.com/exploits/23668 http://lists.grok.org.uk/pipermail/full-disclosure/2004-February/016881.html http://secunia.com/advisories/10820 http://www.securityfocus.com/bid/9611 https://exchange.xforce.ibmcloud.com/vulnerabilities/15078 •
CVE-2003-0816 – Microsoft Internet Explorer 5 - window.open Search Pane Cross-Zone Scripting
https://notcve.org/view.php?id=CVE-2003-0816
Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability. Internet Explorer 6 SP1 y anteriores permite que atacantes remotos se salten restricciones de seguridad mediante: (1) uso del método NavigateAndFind para descargar un fichero, (2) uso del método window.open para cargar un fichero, (3) fijando la propriedad href en el tag base para la ventana _search, (4) cargando la venta de búsqueda en un Iframe, (5) capturando una URL de javascript en el histórico del navegador. • https://www.exploit-db.com/exploits/23790 https://www.exploit-db.com/exploits/23131 http://marc.info/?l=bugtraq&m=106321638416884&w=2 http://marc.info/?l=bugtraq&m=106321693517858&w=2 http://marc.info/?l=bugtraq&m=106321781819727&w=2 http://marc.info/?l=bugtraq&m=106321882821788&w=2 http://marc.info/? •