Vulnerabilities > Microsoft > Internet Explorer > High

DATE CVE VULNERABILITY TITLE RISK
2002-09-24 CVE-2002-0647 Unspecified vulnerability in Microsoft Internet Explorer 5.01/5.5/6.0
Buffer overflow in a legacy ActiveX control used to display specially formatted text in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code, aka "Buffer Overrun in Legacy Text Formatting ActiveX Control".
network
low complexity
microsoft
7.5
2002-08-12 CVE-2002-0832 Unspecified vulnerability in Microsoft Internet Explorer 5.0/5.5/6.0
Internet Explorer 5, 5.6, and 6 allows remote attackers to bypass cookie privacy settings and store information across browser sessions via the userData (storeuserData) feature.
network
low complexity
microsoft
7.5
2002-08-12 CVE-2002-0815 The Javascript "Same Origin Policy" (SOP), as implemented in (1) Netscape, (2) Mozilla, and (3) Internet Explorer, allows a remote web server to access HTTP and SOAP/XML content from restricted sites by mapping the malicious server's parent DNS domain name to the restricted site, loading a page from the restricted site into one frame, and passing the information to the attacker-controlled frame, which is allowed because the document.domain of the two frames matches on the parent domain.
network
low complexity
mozilla netscape microsoft
7.5
2002-07-03 CVE-2002-0371 Buffer overflow in gopher client for Microsoft Internet Explorer 5.1 through 6.0, Proxy Server 2.0, or ISA Server 2000 allows remote attackers to execute arbitrary code via a gopher:// URL that redirects the user to a real or simulated gopher server that sends a long response.
network
low complexity
microsoft university-of-minnesota
7.5
2002-05-29 CVE-2002-0269 Unspecified vulnerability in Microsoft Internet Explorer
Internet Explorer 5.x and 6 interprets an object as an HTML document even when its MIME Content-Type is text/plain, which could allow remote attackers to execute arbitrary script in documents that the user does not expect, possibly through web applications that use a text/plain type to prevent cross-site scripting attacks.
network
low complexity
microsoft
7.5
2002-05-29 CVE-2002-0242 Unspecified vulnerability in Microsoft Internet Explorer
Cross-site scripting vulnerability in Internet Explorer 6 earlier allows remote attackers to execute arbitrary script via an Extended HTML Form, whose output from the remote server is not properly cleansed.
network
low complexity
microsoft
7.5
2002-05-29 CVE-2002-0193 Unspecified vulnerability in Microsoft Internet Explorer 5.0.1/6.0
Microsoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the first variant of the "Content Disposition" vulnerability.
network
low complexity
microsoft
7.5
2002-05-29 CVE-2002-0190 Unspecified vulnerability in Microsoft Internet Explorer 5.01/5.5/6.0
Microsoft Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to execute arbitrary code under fewer security restrictions via a malformed web page that requires NetBIOS connectivity, aka "Zone Spoofing through Malformed Web Page" vulnerability.
network
low complexity
microsoft
7.5
2002-05-29 CVE-2002-0189 Unspecified vulnerability in Microsoft Internet Explorer 5.0/5.5/6.0
Cross-site scripting vulnerability in Internet Explorer 6.0 allows remote attackers to execute scripts in the Local Computer zone via a URL that exploits a local HTML resource file, aka the "Cross-Site Scripting in Local HTML Resource" vulnerability.
network
low complexity
microsoft
7.5
2002-05-29 CVE-2002-0188 Unspecified vulnerability in Microsoft Internet Explorer 5.01/6.0
Microsoft Internet Explorer 5.01 and 6.0 allow remote attackers to execute arbitrary code via malformed Content-Disposition and Content-Type header fields that cause the application for the spoofed file type to pass the file back to the operating system for handling rather than raise an error message, aka the second variant of the "Content Disposition" vulnerability.
network
low complexity
microsoft
7.5