Exploring the explodable
-
Yet another IE aperture
Advisory and demonstration
-
IE and .xla may lead to problems
Advisory and demonstration
-
Excel XP xml stylesheet problems
Advisory and demonstration
-
Digitally signing buggy ActiveX components (version 2.0)
Advisory and demonstration
-
More office XP problems (version 3.0)
Advisory and demonstration
-
Digitally signing buggy ActiveX components
Advisory and demonstration
-
IE GetObject() problems
Advisory and demonstration
-
Javascript in IE may spoof the whole screen
Advisory and demonstration
-
MS Office XP - the more money I give to Microsoft, the more vulnerable my Windows computers are
Advisory and demonstration
-
XML scripting in IE, Outlook Express
Advisory and demonstration
-
Security bug in Internet Explorer - MSScriptControl.ScriptControl
Advisory and demonstration
-
Security bugs in interactions between IE 5.x, IIS 5.0 and Exchange 2000
Advisory and demonstration
-
Windows Media Player 7 and IE java vulnerability - executing arbitrary programs
Advisory and demonstration
-
Windows Media Player 7 and IE vulnerability - executing arbitrary programs
Advisory and demonstration
-
OBJECT TYPE="text/html" may allow executing arbitrary programs in IE 5.5
Advisory and demonstration
-
IE 5.x/Outlook allows executing arbitrary programs using .chm files and temporary internet files folder
Advisory and demonstration
-
IE 5.x Win2000 Indexing service vulnerability
Advisory and demonstration
-
IE 5.5/Outlook java security vulnerability - reading arbitrary local files and URLs
Advisory and demonstration
-
IE 5.5/Outlook security vulnerability - com.ms.activeX.ActiveXComponent allows executing arbitrary programs
Advisory and demonstration
-
IE 5.5/Outlook Express security vulnerability - GetObject() expose user's files
Advisory and demonstration
-
IE 5.5 Cross Frame security vulnerability - Web Browser Control's Navigate method
Advisory and demonstration
-
IE 5.5/5.x for Win98 may execute arbitrary files that can be accessed thru Microsoft Networking. Also local Administrator compromise at least on default Windows 2000
Advisory
-
MS Word and MS Access vulnerability - executing arbitrary programs, may be exploited by IE/Outlook
Advisory and demonstration
-
IE 5.5 and 5.01 vulnerability - reading at least local and from any host text and parsed html files
Advisory and demonstration
-
Excel 2000/97 vulnerability - executing programs
Advisory and demonstration
-
IE 5 and Access 2000 vulnerability - executing programs
Advisory and demonstration
-
IE 5 and Excel 2000, PowerPoint 2000 vulnerability - executing programs
Advisory and demonstration
-
IE 5 Cross-frame security vulnerability using IFRAME and WebBrowser control
Advisory and demonstration
-
IE 5 security vulnerablity - circumventing Cross-frame security policy using Java/JavaScript (and disabling Active Scripting is not that easy)
Advisory and demonstration
-
IE and Outlook 5.x allow executing arbitrary programs using .eml files
Advisory and demonstration
-
.chm vulnerability - executing arbitrary programs
Advisory and demonstration
-
Wordpad vulnerability, exploitable also in IE for Win9x
Advisory and demonstration
-
Outlook Express 5 vulnerability - Active Scripting may read email messagesAdvisory and demonstration
-
IE 5 security vulnerablity - circumventing Cross-frame security policy and accessing the DOM of "old" documentsAdvisory and demonstration
-
IE 5.01 vulnerabilities in external.NavigateAndFind()Advisory and demonstration
-
Default IE 5.0 security settings allow frame spoofingAdvisory and demonstration
-
IE 5.0 XML HTTP redirect problemsAdvisory and demonstration
-
IE 5.0 and Windows Media Player ActiveX object allow checking the existence of local files and directoriesAdvisory and demonstration
-
New IE 5.0 HTTP redirect vulnerabilities Advisory and demonstration
-
IE 5.0 HTTP redirect to "javascript:" vulnerability Advisory and demonstration
-
IE 5.0 IFRAME and document.execCommand vulnerability Advisory and demonstration
-
IE 5.0 "download behavior" vulnerability Advisory and demonstration
-
IE 5.0 ImportExportFavorites vulnerabilities Advisory and demonstration
-
Executing programs with IE 5.0. Vulnerable: IE 5.0 Test it
-
Favorites vulnerabilities. Vulnerable: IE 5.0, 4.x, Win9x Test it
-
IE Cross-frame vulnerabilities - %01 bug again. Vulnerable: IE 5.0, 4.x Test it
-
IE can read local files. Vulnerable: IE 5.0 Test it
-
IE can read local files. Vulnerable: IE 5.0 Test it
-
IE can read local files and spoof windows. Vulnerable: IE 4.0, 4.01 Test it
-
IE can read local files. Vulnerable: IE 3, 4.0, 4.01. Test
it
-
Buffer overrun in the JScript external. Microsoft has issued a patch. Vulnerable:
IE 4.0, 4.01 Win95/NT. Test it
-
Buffer overrun in the OBJECT tag. Vulnerable: IE 4.0. Test
it
-
Embed issue: buffer overrun, exploitable. Microsoft has issued a patch.
Vulnerable: IE 4.0, 4.01 Win95/NT. More info
Test it