become an editor
the entire directory
only in Internet_Explorer/Security
Computers: Software: Internet: Clients: Web: Browsers: Security
Internet Explorer Security Pro
- Internet Explorer Security is a utility that customizes aspects of the Internet Explorer Web browser.
Microsoft Internet Explorer 4.x 5.x - Frame Loop Vulnerability
- Advisory by USSR: "It is possible to create a malicious webpage that when visited by an IE user all of their system resources are devoured and depending on the system its possible that the machine can even crash and reboot itself."
Microsoft: Q167614 - Update Available For "Frame Spoof" Security Issue
- An update that addresses a potential security issue with regard to the use of frames in Internet Explorer.
Privacy Secrets of MicroSoft's Internet Explorer
- Security and internet privacy issues of Global Histories, Cookies, and Cache while browsing with Mac Explorer 5.0
Windows Security Guide: Internet Explorer
- Descriptions, and patch information, for vulnerabilities affecting various versions of this browser.
Security Fix: Internet Explorer Unsafe for 284 Days in 2006
- Brian Krebs explains the methodology behind the statistics that resulted in this headline. (January 04, 2007)
GreyMagic Security: Appendix to "IE allows universal Cross Site Scripting"
- Explains how the "ANALYZE.DLG" resource can be manipulated to allow the execution of arbitrary code in the My Computer" zone. (April 16, 2002)
The Register: MS Security Patch Fails on Local Files
- The MS patch intended to fix a data binding flaw in IE, which enables a script to call executables on your Windows machine using the object tag, does not protect against malicious files launched from a local directory. (April 02, 2002)
The Register: Cumulative IE Patch for Maicious Cookies
- A fairly serious flaw in Internet Explorer which would enable a malicious Web page or e-mail to drop a cookie containing an HTML script on a victim's machine and run it in the 'Local Computer' zone rather than the Internet zone to avoid restrictions has just been patched. (April 01, 2002)
Retrieving Information on Local Files in IE
- Explains how the IMG element's dynsrc attribute can be exploited to test the existence of, find the size of, find the date last updated/modified of, and the creation date of, an arbitrary local file. By GreyMagic Security. (March 27, 2002)
The Register: IE, Outlook Run Malicious Commands Without Scripting
- An attacker can run arbitrary commands on Windows machines with a simple bit of HTML, an Israeli security researcher has demonstrated. The exploit will work with IE, Outlook and Outlook Express even if active scripting and ActiveX are disabled in the browser security settings. (March 04, 2002)
Executing Arbitrary Commands Without Active Scripting or ActiveX
- Advisory by GreyMagic Security explains how a vulnerability in elements can be exploited with data binding. (February 27, 2002)
CERT Advisory: Buffer Overflow in Microsoft Internet Explorer
- Provides an overview and solutions to this vulnerability which, theoretically, affects all applications utilizing the Internet Explorer HTML rendering engine. (February 25, 2002)
The Register: Three New MS Security Holes - Two Nasty
- Includes: MSXML may ignore IE security zone settings during a request for data from a Web site; and a VBscript problem which allows an attacker to read files on a victim's local drive, or eavesdrop on his browsing session. (February 22, 2002)
CNET: Buffer-overflow Bug in IE
- "Microsoft is urging users of its Internet Explorer browser to download a patch for a newly discovered buffer-overflow security bug. The bug takes advantage of the way some versions of the IE browser handle long strings of JScript code." (August 19, 1998)
" search on:
to edit this category.
Copyright © 1998-2015 AOL Inc.
Visit our sister sites
Last update: April 29, 2014 at 6:35:11 UTC -