Vulnerabilities > Microsoft

DATE CVE VULNERABILITY TITLE RISK
2004-02-07 CVE-2004-2090 Unspecified vulnerability in Microsoft IE and Internet Explorer
Microsoft Internet Explorer 5.0.1 through 6.0 allows remote attackers to determine the existence of arbitrary files via the VBScript LoadPicture method, which returns an error code if the file does not exist.
network
low complexity
microsoft
5.0
2004-02-03 CVE-2003-0823 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 6 SP1 and earlier allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by calling the window.moveBy method, aka HijackClick, a different vulnerability than CVE-2003-1027.
network
low complexity
microsoft
7.5
2004-02-03 CVE-2003-0817 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions and read arbitrary files via an XML object.
network
low complexity
microsoft
7.5
2004-02-03 CVE-2003-0816 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions by (1) using the NavigateAndFind method to load a file: URL containing Javascript, as demonstrated by NAFfileJPU, (2) using the window.open method to load a file: URL containing Javascript, as demonstrated using WsOpenFileJPU, (3) setting the href property in the base tag for the _search window, as demonstrated using WsBASEjpu, (4) loading the search window into an Iframe, as demonstrated using WsFakeSrc, (5) caching a javascript: URL in the browser history, then accessing that URL in the same frame as the target domain, as demonstrated using WsOpenJpuInHistory, NAFjpuInHistory, BackMyParent, BackMyParent2, and RefBack, aka the "Script URLs Cross Domain" vulnerability.
network
low complexity
microsoft
7.5
2004-02-03 CVE-2003-0815 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and read arbitrary files by (1) modifying the createTextRange method and using CreateLink, as demonstrated using LinkillerSaveRef, LinkillerJPU, and Linkiller, or (2) modifying the createRange method and using the FIND dialog to select text, as demonstrated using Findeath, aka the "Function Pointer Override Cross Domain" vulnerability.
network
low complexity
microsoft
7.5
2004-02-03 CVE-2003-0814 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 6 SP1 and earlier allows remote attackers to bypass zone restrictions and execute Javascript by setting the window's "href" to the malicious Javascript, then calling execCommand("Refresh") to refresh the page, aka BodyRefreshLoadsJPU or the "ExecCommand Cross Domain" vulnerability.
network
low complexity
microsoft
7.5
2004-01-20 CVE-2003-1028 Unspecified vulnerability in Microsoft IE and Internet Explorer
The download function of Internet Explorer 6 SP1 allows remote attackers to obtain the cache directory name via an HTTP response with an invalid ContentType and a .htm file, which could allow remote attackers to bypass security mechanisms that rely on random names, as demonstrated by threadid10008.
network
low complexity
microsoft
5.0
2004-01-20 CVE-2003-1027 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 5.01 through 6 SP1 allows remote attackers to direct drag and drop behaviors and other mouse click actions to other windows by using method caching (SaveRef) to access the window.moveBy method, which is otherwise inaccessible, as demonstrated by HijackClickV2, a different vulnerability than CVE-2003-0823, aka the "Function Pointer Drag and Drop Vulnerability."
network
low complexity
microsoft
critical
10.0
2004-01-20 CVE-2003-1026 Permissions, Privileges, and Access Controls vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 5.01 through 6 SP1 allows remote attackers to bypass zone restrictions via a javascript protocol URL in a sub-frame, which is added to the history list and executed in the top window's zone when the history.back (back) function is called, as demonstrated by BackToFramedJpu, aka the "Travel Log Cross Domain Vulnerability."
network
microsoft CWE-264
critical
9.3
2004-01-20 CVE-2003-1025 Improper Input Validation vulnerability in Microsoft Internet Explorer 6.0
Internet Explorer 5.01 through 6 SP1 allows remote attackers to spoof the domain of a URL via a "%01" character before an @ sign in the user@domain portion of the URL, which hides the rest of the URL, including the real site, in the address bar, aka the "Improper URL Canonicalization Vulnerability."
network
microsoft CWE-20
4.3