Vulnerabilities > Microsoft > Internet Explorer

DATE CVE VULNERABILITY TITLE RISK
2000-01-07 CVE-2000-0061 Unspecified vulnerability in Microsoft Internet Explorer
Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading.
network
low complexity
microsoft
critical
10.0
1999-12-31 CVE-1999-1473 Unspecified vulnerability in Microsoft Internet Explorer 3.0.2/4.0
When a Web site redirects the browser to another site, Internet Explorer 3.02 and 4.0 automatically resends authentication information to the second site, aka the "Page Redirect Issue."
network
low complexity
microsoft
5.0
1999-12-31 CVE-1999-1472 Unspecified vulnerability in Microsoft Internet Explorer 4.0
Internet Explorer 4.0 allows remote attackers to read arbitrary text and HTML files on the user's machine via a small IFRAME that uses Dynamic HTML (DHTML) to send the data to the attacker, aka the Freiburg text-viewing issue.
network
low complexity
microsoft
5.0
1999-12-31 CVE-1999-1094 Unspecified vulnerability in Microsoft Internet Explorer
Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue."
network
low complexity
microsoft
7.5
1999-12-31 CVE-1999-1093 Unspecified vulnerability in Microsoft Internet Explorer 4.0/4.0.1
Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page.
network
high complexity
microsoft
5.1
1999-12-31 CVE-1999-1087 Unspecified vulnerability in Microsoft Internet Explorer 4.0/4.0.1
Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server.
network
low complexity
microsoft
7.5
1999-12-23 CVE-2000-0028 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 5.0 and 5.01 allows remote attackers to bypass the cross frame security policy and read files via the external.NavigateAndFind function.
network
high complexity
microsoft
2.6
1999-11-17 CVE-1999-0793 Unspecified vulnerability in Microsoft Internet Explorer 4.0.1/5.0
Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet.
network
high complexity
microsoft
2.6
1999-11-14 CVE-1999-1110 Unspecified vulnerability in Microsoft Internet Explorer 5.0
Windows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code when a file does not exist, which allows remote malicious web sites to determine the existence of files on the client.
network
low complexity
microsoft
5.0
1999-11-11 CVE-2000-0329 Unspecified vulnerability in Microsoft products
A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.
network
high complexity
microsoft
5.1