| Vuln ID | Summary | CVSS Severity |
|---|---|---|
| CVE-2006-1190 |
Microsoft Internet Explorer 5.01 through 6 does not always return the correct IOleClientSite information when dynamically creating an embedded object, which could cause Internet Explorer to run the object in the wrong security context or zone, and allow remote attackers to execute arbitrary code. Published: April 11, 2006; 7:02:00 PM -0400 |
V3.x:(not available) V2.0: 10.0 HIGH |
| CVE-2006-1191 |
Microsoft Internet Explorer 5.01 through 6 does not always correctly identify the domain that is associated with a browser window, which allows remote attackers to obtain sensitive cross-domain information and spoof sites by running script after the user has navigated to another site. Published: April 11, 2006; 7:02:00 PM -0400 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
| CVE-2006-1192 |
Microsoft Internet Explorer 5.01 through 6 allows remote attackers to conduct phishing attacks by spoofing the address bar and other parts of the trust UI via unknown methods that allow "window content to persist" after the user has navigated to another site, aka the "Address Bar Spoofing Vulnerability." NOTE: this is a different vulnerability than CVE-2006-1626. Published: April 11, 2006; 7:02:00 PM -0400 |
V3.x:(not available) V2.0: 2.6 LOW |
| CVE-2006-1719 |
Internet Explorer 6 allows remote attackers to cause a denial of service (application crash) via any scrollbar Cascading Style Sheets (CSS) property. Published: April 11, 2006; 7:02:00 PM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2006-1626 |
Internet Explorer 6 for Windows XP SP2 and earlier allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still loading. NOTE: this is a different vulnerability than CVE-2006-1192. Published: April 05, 2006; 6:04:00 AM -0400 |
V3.x:(not available) V2.0: 4.3 MEDIUM |
| CVE-2006-1388 |
Unspecified vulnerability in Microsoft Internet Explorer 6.0 allows remote attackers to execute HTA files via unknown vectors. Published: March 24, 2006; 3:02:00 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2006-1359 |
Microsoft Internet Explorer 6 and 7 Beta 2 allows remote attackers to cause a denial of service and possibly execute arbitrary code via a certain createTextRange call on a checkbox object, which results in a dereference of an invalid table pointer. Published: March 22, 2006; 7:06:00 PM -0500 |
V3.x:(not available) V2.0: 9.3 HIGH |
| CVE-2006-1245 |
Buffer overflow in mshtml.dll in Microsoft Internet Explorer 6.0.2900.2180, and probably other versions, allows remote attackers to execute arbitrary code via an HTML tag with a large number of script action handlers such as onload and onmouseover, as demonstrated using onclick, aka the "Multiple Event Handler Memory Corruption Vulnerability." Published: March 16, 2006; 8:02:00 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2006-1016 |
Buffer overflow in the IsComponentInstalled method in Internet Explorer 6.0, when used on Windows 2000 before SP4 or Windows XP before SP1, allows remote attackers to execute arbitrary code via JavaScript that calls IsComponentInstalled with a long first argument. Published: March 06, 2006; 7:02:00 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2006-0830 |
The scripting engine in Internet Explorer allows remote attackers to cause a denial of service (resource consumption) and possibly execute arbitrary code via a web page that contains a recurrent call to an infinite loop in Javascript or VBscript, which consumes the stack, as demonstrated by resetting the "location" variable within the loop. Published: February 21, 2006; 6:02:00 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2006-0799 |
Microsoft Internet Explorer allows remote attackers to spoof a legitimate URL in the status bar and conduct a phishing attack via a web page with an anchor element with a legitimate "href" attribute, a form whose action points to a malicious URL, and an INPUT submit element that is modified to look like a legitimate URL. NOTE: this issue is very similar to CVE-2004-1104, although the manipulations are slightly different. Published: February 19, 2006; 4:02:00 PM -0500 |
V3.x:(not available) V2.0: 4.0 MEDIUM |
| CVE-2006-0753 |
Memory leak in Microsoft Internet Explorer 6 for Windows XP Service Pack 2 allows remote attackers to cause a denial of service (memory consumption) via JavaScript that uses setInterval to repeatedly call a function to set the value of window.status. Published: February 17, 2006; 9:02:00 PM -0500 |
V3.x:(not available) V2.0: 2.6 LOW |
| CVE-2006-0585 |
jscript.dll in Microsoft Internet Explorer 6.0 SP1 and earlier allows remote attackers to cause a denial of service (application crash) via a Shockwave Flash object that contains ActionScript code that calls VBScript, which in turn calls the Javascript document.write function, which triggers a null dereference. Published: February 07, 2006; 8:02:00 PM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2006-0544 |
urlmon.dll in Microsoft Internet Explorer 7.0 beta 2 (aka 7.0.5296.0) allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a BGSOUND element with its SRC attribute set to "file://" followed by a large number of "-" (dash of hyphen) characters. Published: February 03, 2006; 9:02:00 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2006-0057 |
Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to bypass the Kill bit settings for dangerous ActiveX controls via unknown vectors involving crafted HTML, which can expose the browser to attacks that would otherwise be prevented by the Kill bit setting. NOTE: CERT/CC claims that MS05-054 fixes this issue, but it is not described in MS05-054. Published: January 27, 2006; 5:03:00 PM -0500 |
V3.x:(not available) V2.0: 7.5 HIGH |
| CVE-2005-3240 |
Race condition in Microsoft Internet Explorer allows user-assisted attackers to overwrite arbitrary files and possibly execute code by tricking a user into performing a drag-and-drop action from certain objects, such as file objects within a folder view, then predicting the drag action, and re-focusing to a malicious window. Published: December 31, 2005; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 5.1 MEDIUM |
| CVE-2005-4625 |
Drivers for certain display adapters, including (1) an unspecified ATI driver and (2) an unspecified Intel driver, might allow remote attackers to cause a denial of service (system crash) via a large JPEG image, as demonstrated in Internet Explorer using stoopid.jpg with a width and height of 9999999. Published: December 31, 2005; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 7.1 HIGH |
| CVE-2005-4679 |
Internet Explorer 6 for Windows XP Service Pack 2 allows remote attackers to spoof the URL in the status bar via the title in an image in a link to a trusted site within a form to the malicious site. Published: December 31, 2005; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2005-4717 |
Microsoft Internet Explorer 6.0 on Windows NT 4.0 SP6a, Windows 2000 SP4, Windows XP SP1, Windows XP SP2, and Windows Server 2003 SP1 allows remote attackers to cause a denial of service (client crash) via a certain combination of a malformed HTML file and a CSS file that triggers a null dereference, probably related to rendering of a DIV element that contains a malformed IMG tag, as demonstrated by IEcrash.htm and IEcrash.rar. Published: December 31, 2005; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |
| CVE-2005-4810 |
Microsoft Internet Explorer 7.0 Beta3 and earlier allows remote attackers to cause a denial of service (crash) via a "text/html" HTML Content-type header sent in response to an XMLHttpRequest (AJAX). Published: December 31, 2005; 12:00:00 AM -0500 |
V3.x:(not available) V2.0: 5.0 MEDIUM |