Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Internet_explorer
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 1640 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
1999-11-14 | CVE-1999-1110 | Windows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code when a file does not exist, which allows remote malicious web sites to determine the existence of files on the client. | Internet_explorer | N/A | ||
1999-11-17 | CVE-1999-0793 | Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet. | Internet_explorer | N/A | ||
1999-12-31 | CVE-1999-1473 | When a Web site redirects the browser to another site, Internet Explorer 3.02 and 4.0 automatically resends authentication information to the second site, aka the "Page Redirect Issue." | Internet_explorer | N/A | ||
1999-12-31 | CVE-1999-1472 | Internet Explorer 4.0 allows remote attackers to read arbitrary text and HTML files on the user's machine via a small IFRAME that uses Dynamic HTML (DHTML) to send the data to the attacker, aka the Freiburg text-viewing issue. | Internet_explorer | N/A | ||
1999-12-31 | CVE-1999-1094 | Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue." | Internet_explorer | N/A | ||
1999-12-31 | CVE-1999-1093 | Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page. | Internet_explorer | N/A | ||
1999-12-31 | CVE-1999-1087 | Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server. | Internet_explorer | N/A | ||
2000-01-07 | CVE-2000-0061 | Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading. | Internet_explorer | N/A | ||
2000-02-16 | CVE-2000-0156 | Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the "Image Source Redirect" vulnerability. | Internet_explorer | N/A | ||
2000-02-18 | CVE-2000-0162 | The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability. | Ie, Internet_explorer, Visual_studio | N/A |