| Vuln ID | Summary | CVSS Severity |
|---|---|---|
| CVE-2006-3281 |
Microsoft Internet Explorer 6.0 does not properly handle Drag and Drop events, which allows remote user-assisted attackers to execute arbitrary code via a link to an SMB file share with a filename that contains encoded ..\ (%2e%2e%5c) sequences and whose extension contains the CLSID Key identifier for HTML Applications (HTA), aka "Folder GUID Code Execution Vulnerability." NOTE: directory traversal sequences were used in the original exploit, although their role is not clear. Published: June 28, 2006; 6:05:00 PM -0400 |
V3.x:(not available) V2.0: 5.1 MEDIUM |
| CVE-2006-3227 |
Interpretation conflict between Internet Explorer and other web browsers such as Mozilla, Opera, and Firefox might allow remote attackers to modify the visual presentation of web pages and possibly bypass protection mechanisms such as content filters via ASCII characters with the 8th bit set, which could be stripped by Internet Explorer to render legible text, but not when using other browsers. NOTE: there has been significant discussion about this issue, and as of 20060625, it is not clear where the responsibility for this issue lies, although it might be due to vagueness within the associated standards. NOTE: this might only be exploitable with certain encodings. Published: June 26, 2006; 12:05:00 PM -0400 |
V3.x:(not available) V2.0: 2.6 LOW |
| CVE-2006-3200 |
Unspecified versions of Internet Explorer allow remote attackers to cause a denial of service (crash) via an IFRAME with a src tag containing a "File://" URI followed by an 8-bit character. NOTE: some third parties were unable to verify this issue. Published: June 23, 2006; 4:06:00 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2006-1303 |
Multiple unspecified vulnerabilities in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allow remote attackers to execute arbitrary code by instantiating certain COM objects from Wmm2fxa.dll as ActiveX controls including (1) DXImageTransform.Microsoft.MMSpecialEffect1Input, (2) DXImageTransform.Microsoft.MMSpecialEffect1Input.1, (3) DXImageTransform.Microsoft.MMSpecialEffect2Inputs, (4) DXImageTransform.Microsoft.MMSpecialEffect2Inputs.1, (5) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input, and (6) DXImageTransform.Microsoft.MMSpecialEffectInplace1Input.1, which causes memory corruption during garbage collection. Published: June 13, 2006; 3:06:00 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2006-2378 |
Buffer overflow in the ART Image Rendering component (jgdw400.dll) in Microsoft Windows XP SP1 and Sp2, Server 2003 SP1 and earlier, and Windows 98 and Me allows remote attackers to execute arbitrary code via a crafted ART image that causes heap corruption. Published: June 13, 2006; 3:06:00 PM -0400 |
V3.x:(not available) V2.0: 6.8 MEDIUM |
| CVE-2006-2382 |
Heap-based buffer overflow in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via crafted UTF-8 encoded HTML that results in size discrepancies during conversion to Unicode, aka "HTML Decoding Memory Corruption Vulnerability." Published: June 13, 2006; 3:06:00 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2006-2383 |
Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to execute arbitrary code via "unexpected data" related to "parameter validation" in the DXImageTransform.Microsoft.Light ActiveX control, which causes Internet Explorer to crash in a way that enables the code execution. Published: June 13, 2006; 3:06:00 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2006-2384 |
Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows remote attackers to conduct spoofing and phishing attacks by using a modal browser window in a way that preserves the original address bar and trusted UI of a trusted site, even after the browser has been navigated to a malicious site, aka the "Address Bar Spoofing Vulnerability." Published: June 13, 2006; 3:06:00 PM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
| CVE-2006-2385 |
Unspecified vulnerability in Microsoft Internet Explorer 5.01 SP4 and 6 SP1 and earlier allows user-assisted remote attackers to execute arbitrary code via a crafted web page that triggers memory corruption when it is saved as a multipart HTML (.mht) file. Published: June 13, 2006; 3:06:00 PM -0400 |
V3.x:(not available) V2.0: 7.6 HIGH |
| CVE-2006-2900 |
Internet Explorer 6 allows user-assisted remote attackers to read arbitrary files by tricking a user into typing the characters of the target filename in a text box and using the OnKeyDown, OnKeyPress, and OnKeyUp Javascript keystroke events to change the focus and cause those characters to be inserted into a file upload input control, which can then upload the file when the user submits the form. Published: June 07, 2006; 12:02:00 PM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
| CVE-2006-2766 |
Buffer overflow in INETCOMM.DLL, as used in Microsoft Internet Explorer 6.0 through 6.0 SP2, Windows Explorer, Outlook Express 6, and possibly other programs, allows remote user-assisted attackers to cause a denial of service (application crash) via a long mhtml URI in the URL value in a URL file. Published: June 02, 2006; 6:18:00 AM -0400 |
V3.x:(not available) V2.0: 2.6 LOW |
| CVE-2006-2218 |
Unspecified vulnerability in Internet Explorer 6.0 on Microsoft Windows XP SP2 allows remote attackers to execute arbitrary code via "exceptional conditions" that trigger memory corruption, as demonstrated using an exception handler and nested object tags, a variant of CVE-2006-1992. Published: May 05, 2006; 8:46:00 AM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2006-2094 |
Microsoft Internet Explorer before Windows XP Service Pack 2 and Windows Server 2003 Service Pack 1, when Prompt is configured in Security Settings, uses modal dialogs to verify that a user wishes to run an ActiveX control or perform other risky actions, which allows user-assisted remote attackers to construct a race condition that tricks a user into clicking an object or pressing keys that are actually applied to a "Yes" approval for executing the control. Published: April 29, 2006; 6:02:00 AM -0400 |
V3.x:(not available) V2.0: 5.1 MEDIUM |
| CVE-2006-2056 |
Argument injection vulnerability in Internet Explorer 6 for Windows XP SP2 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API. Published: April 26, 2006; 4:06:00 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2006-2057 |
Argument injection vulnerability in Mozilla Firefox 1.0.6 allows user-assisted remote attackers to modify command line arguments to an invoked mail client via " (double quote) characters in a mailto: scheme handler, as demonstrated by launching Microsoft Outlook with an arbitrary filename as an attachment. NOTE: it is not clear whether this issue is implementation-specific or a problem in the Microsoft API. Published: April 26, 2006; 4:06:00 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2006-1992 |
mshtml.dll 6.00.2900.2873, as used in Microsoft Internet Explorer, allows remote attackers to cause a denial of service (crash) via nested OBJECT tags, which trigger invalid pointer dereferences including NULL dereferences. NOTE: the possibility of code execution was originally theorized, but Microsoft has stated that this issue is non-exploitable. Published: April 24, 2006; 9:02:00 PM -0400 |
V3.x:(not available) V2.0: 2.6 LOW |
| CVE-2006-1185 |
Unspecified vulnerability in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via certain invalid HTML that causes memory corruption. Published: April 11, 2006; 7:02:00 PM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2006-1186 |
Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via by instantiating the (1) Mdt2gddr.dll, (2) Mdt2dd.dll, and (3) Mdt2gddo.dll COM objects as ActiveX controls, which leads to memory corruption. Published: April 11, 2006; 7:02:00 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2006-1188 |
Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via HTML elements with a certain crafted tag, which leads to memory corruption. Published: April 11, 2006; 7:02:00 PM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2006-1189 |
Buffer overflow in URLMON.DLL in Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via a crafted URL with an International Domain Name (IDN) using double-byte character sets (DBCS), aka the "Double Byte Character Parsing Memory Corruption Vulnerability." Published: April 11, 2006; 7:02:00 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |