Microsoft

Internet Explorer

1637 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 7.58%
  • Published 24.09.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to misrepresent the source of a file in the File Download dialogue box to trick users into thinking that the file type is safe to download, aka "File Origin Spoofing."

  • EPSS 24.17%
  • Published 24.09.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Microsoft Internet Explorer 5.5 and 6.0 does not properly verify the domain of a frame within a browser window, which allows remote attackers to read client files or invoke executable objects via the Object tag, aka "Cross Domain Verification in Obje...

  • EPSS 57.72%
  • Published 24.09.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Internet Explorer 4.0 and later allows remote attackers to read arbitrary files via a web page that accesses a legacy XML Datasource applet (com.ms.xml.dso.XMLDSO.class) and modifies the base URL to point to the local system, which is trusted by the ...

  • EPSS 40.45%
  • Published 24.09.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

The Web Folder component for Internet Explorer 5.5 and 6.0 writes an error message to a known location in the temporary folder, which allows remote attackers to execute arbitrary code by injecting it into the error message, then referring to the erro...

Exploit
  • EPSS 17.1%
  • Published 15.08.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

The Google toolbar 1.1.60, when running on Internet Explorer 5.5 and 6.0, allows remote attackers to cause a denial of service (crash with an exception in oleaut32.dll) via malicious HTML, possibly related to small width and height parameters or an i...

Exploit
  • EPSS 10.75%
  • Published 12.08.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Internet Explorer 5.01 through 6 allows remote attackers to cause a denial of service (application crash) via Javascript in a web page that calls location.replace on itself, causing a loop.

Exploit
  • EPSS 20.39%
  • Published 12.08.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Internet Explorer 5.0 through 6.0 allows remote attackers to determine the existence of files on the client via an IMG tag with a dynsrc property that references the target file, which sets certain elements of the image object such as file size.

  • EPSS 1.43%
  • Published 12.08.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

The Javascript "Same Origin Policy" (SOP), as implemented in (1) Netscape, (2) Mozilla, and (3) Internet Explorer, allows a remote web server to access HTTP and SOAP/XML content from restricted sites by mapping the malicious server's parent DNS domai...

  • EPSS 2.33%
  • Published 12.08.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Internet Explorer 5, 5.6, and 6 allows remote attackers to bypass cookie privacy settings and store information across browser sessions via the userData (storeuserData) feature.

  • EPSS 65.77%
  • Published 03.07.2002 04:00:00
  • Last modified 03.04.2025 01:03:51

Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server ...