This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2001-10-30
Product Ie Last view 2006-12-12
Version 5.0 Type Application
Update *  
Edition mac%2Bos  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:microsoft:ie

Activity : Overall

Related : CVE

  Date Alert Description
2.6 2006-12-12 CVE-2006-5578

Microsoft Internet Explorer 6 and earlier allows remote attackers to read Temporary Internet Files (TIF) and obtain sensitive information via unspecified vectors involving certain drag and drop operations, aka "TIF Folder Information Disclosure Vulnerability," and a different issue than CVE-2006-5577.

4.3 2006-12-12 CVE-2006-5577

Microsoft Internet Explorer 6 and earlier allows remote attackers to obtain sensitive information via unspecified uses of the OBJECT HTML tag, which discloses the absolute path of the corresponding TIF folder, aka "TIF Folder Information Disclosure Vulnerability," and a different issue than CVE-2006-5578.

5 2006-09-19 CVE-2006-4888

Microsoft Internet Explorer 6 and earlier allows remote attackers to cause a denial of service (application hang) via a CSS-formatted HTML INPUT element within a DIV element that has a larger size than the INPUT.

7.5 2001-10-30 CVE-2001-0665

Internet Explorer 6 and earlier allows remote attackers to cause certain HTTP requests to be automatically executed and appear to come from the user, which could allow attackers to gain privileges or execute operations within web-based services, aka the "HTTP Request Encoding vulnerability."

Open Source Vulnerability Database (OSVDB)

id Description
30816 Microsoft IE TIF Folder Cached Content Information Disclosure
30815 Microsoft IE TIF Folder Drag and Drop Operation Information Disclosure
28614 Microsoft IE input/div Tag width Conflict DoS
1972 Microsoft IE HTTP Request Encoding

Nessus® Vulnerability Scanner

id Description
2006-12-12 Name: Arbitrary code can be executed on the remote host through the web client.
File: smb_nt_ms06-072.nasl - Type: ACT_GATHER_INFO