Vulnerabilities > CVE-2002-1188 - Unspecified vulnerability in Microsoft Internet Explorer 5.0.1/5.5/6.0
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Internet Explorer 5.01 through 6.0 allows remote attackers to identify the path to the Temporary Internet Files folder and obtain user information such as cookies via certain uses of the OBJECT tag, which are not subjected to the proper security checks, aka "Temporary Internet Files folders Name Reading."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 |
Oval
accepted 2014-02-24T04:03:18.732-05:00 class vulnerability contributors name Harvey Rubinovitz organization The MITRE Corporation name Christine Walzer organization The MITRE Corporation name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01 through 6.0 allows remote attackers to identify the path to the Temporary Internet Files folder and obtain user information such as cookies via certain uses of the OBJECT tag, which are not subjected to the proper security checks, aka "Temporary Internet Files folders Name Reading." family windows id oval:org.mitre.oval:def:444 status accepted submitted 2004-01-27T05:00:00.000-04:00 title IE v6.0 Temporary Internet Files folders Name Reading Vulnerability version 67 accepted 2014-02-24T04:03:25.602-05:00 class vulnerability contributors name Harvey Rubinovitz organization The MITRE Corporation name Maria Mikhno organization ALTX-SOFT
description Internet Explorer 5.01 through 6.0 allows remote attackers to identify the path to the Temporary Internet Files folder and obtain user information such as cookies via certain uses of the OBJECT tag, which are not subjected to the proper security checks, aka "Temporary Internet Files folders Name Reading." family windows id oval:org.mitre.oval:def:690 status accepted submitted 2004-01-27T12:00:00.000-04:00 title IE v5.5 Temporary Internet Files folders Name Reading Vulnerability version 66
References
- http://marc.info/?l=bugtraq&m=103184415307193&w=2
- http://marc.info/?l=bugtraq&m=103184415307193&w=2
- http://www.ciac.org/ciac/bulletins/n-018.shtml
- http://www.ciac.org/ciac/bulletins/n-018.shtml
- http://www.iss.net/security_center/static/10665.php
- http://www.iss.net/security_center/static/10665.php
- http://www.securityfocus.com/bid/6217
- http://www.securityfocus.com/bid/6217
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-066
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-066
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A444
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A444
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A690
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A690