Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
http-equiv vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0400
The Microsoft Active Movie ActiveX Control in Internet Explorer 5 does not restrict which file types can be downloaded, which allows an malicious user to download any type of file to a user's system by encoding it within an email message or news post.
Microsoft Internet Explorer 5
1 EDB exploit
NA
CVE-2004-0501
Outlook 2003 allows remote malicious users to bypass intended access restrictions and cause Outlook to request a URL from a remote site via an HTML e-mail message containing a Vector Markup Language (VML) entity whose src parameter points to the remote site, which could allow rem...
Microsoft Outlook 2003
1 EDB exploit
NA
CVE-2001-1188
mailto.exe in Brian Dorricott MAILTO 1.0.9 and previous versions allows remote malicious users to send SPAM e-mail through remote servers by modifying the sendto, email, server, subject, and resulturl hidden form fields.
Brian Dorricott Mailto 1.0.7
Brian Dorricott Mailto 1.0.8
Brian Dorricott Mailto 1.0.9
1 EDB exploit
NA
CVE-2004-1104
Microsoft Internet Explorer 6.0 SP2 allows remote malicious users to spoof a legitimate URL in the status bar and conduct a phishing attack via a web page that contains a BASE element that points to the legitimate site, followed by an anchor (a) element with an empty "href&q...
Microsoft Ie 6.0
1 EDB exploit
NA
CVE-2003-0838
Internet Explorer allows remote malicious users to bypass zone restrictions to inject and execute arbitrary programs by creating a popup window and inserting ActiveX object code with a "data" tag pointing to the malicious code, which Internet Explorer treats as HTML or ...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6.0
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
1 EDB exploit
NA
CVE-2001-0365
Eudora prior to 5.1 allows a remote malicious user to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code...
Qualcomm Eudora 5.0.2
Qualcomm Eudora
1 EDB exploit
NA
CVE-2004-0502
Outlook 2003, when replying to an e-mail message, stores certain files in a predictable location for the "src" of an img tag of the original message, which allows remote malicious users to bypass zone restrictions and exploit other issues that rely on predictable locati...
Microsoft Outlook 2003
1 EDB exploit
NA
CVE-2004-0526
Unknown versions of Internet Explorer and Outlook allow remote malicious users to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, w...
Microsoft Internet Explorer 5.0
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
Microsoft Outlook 2000
Microsoft Outlook 2002
Microsoft Outlook 2003
Microsoft Outlook Express 4.72.3612
Microsoft Outlook Express 5.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
Microsoft Outlook Express 4.27.3110
Microsoft Outlook Express 4.72.2106
Microsoft Outlook Express 4.72.3120.0
Microsoft Outlook 97
Microsoft Outlook 98
Microsoft Outlook Express 5.0.1
Microsoft Outlook Express 5.5
Microsoft Outlook Express 4.0
Microsoft Outlook Express 4.01
Microsoft Outlook Express 6.0
1 EDB exploit
NA
CVE-2003-0809
Internet Explorer 5.01 up to and including 6.0 does not properly handle object tags returned from a Web server during XML data binding, which allows remote malicious users to execute arbitrary code via an HTML e-mail message or web page.
Microsoft Internet Explorer 5.0.1
Microsoft Ie 6.0
Microsoft Internet Explorer 5.5
Microsoft Internet Explorer 6.0
1 EDB exploit
NA
CVE-2001-1326
Eudora 5.1 allows remote malicious users to execute arbitrary code when the "Use Microsoft Viewer" option is enabled and the "allow executables in HTML content" option is disabled, via an HTML email with a form that is activated from an image that the attacker...
Qualcomm Eudora 5.1
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
SSTI
CVE-2024-35863
CVE-2024-35910
man-in-the-middle
CVE-2024-35912
CVE-2024-25742
LFI
CVE-2024-32002
CVE-2024-22120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »