http-equiv

31 exploits Active since May 2000
EIP-2026-118924 EXPLOITDB text WRITEUP
Mozilla Browser 1.6/1.7 - URI Obfuscation
CVE-2001-1326 EXPLOITDB text WORKING POC
Eudora 5.1 - RCE
Eudora 5.1 allows remote attackers to execute arbitrary code when the "Use Microsoft Viewer" option is enabled and the "allow executables in HTML content" option is disabled, via an HTML email with a form that is activated from an image that the attacker spoofs as a link, which causes the user to execute the form and access embedded attachments.
CVE-2001-0365 EXPLOITDB text WRITEUP
Eudora <5.1 - RCE
Eudora before 5.1 allows a remote attacker to execute arbitrary code, when the 'Use Microsoft Viewer' and 'allow executables in HTML content' options are enabled, via an HTML email message containing Javascript, with ActiveX controls and malicious code within IMG tags.
EIP-2026-118836 EXPLOITDB text WORKING POC
Microsoft Internet Explorer 6 - Search Pane URI Obfuscation
CVE-2002-0980 EXPLOITDB html WORKING POC
Internet Explorer <6.0 - RCE
The Web Folder component for Internet Explorer 5.5 and 6.0 writes an error message to a known location in the temporary folder, which allows remote attackers to execute arbitrary code by injecting it into the error message, then referring to the error message file via a mhtml: URL.
EIP-2026-118863 EXPLOITDB text WORKING POC
Microsoft Outlook Express 5/6 - Script Execution
EIP-2026-118865 EXPLOITDB text WORKING POC
Microsoft Outlook Express 6 - '.XML' File Attachment Script Execution
EIP-2026-118866 EXPLOITDB text WRITEUP
Microsoft Outlook Express 6.0 - URI Obfuscation
CVE-2003-1378 EXPLOITDB text WORKING POC
Microsoft Outlook - Access Control
Microsoft Outlook Express 6.0 and Outlook 2000, with the security zone set to Internet Zone, allows remote attackers to execute arbitrary programs via an HTML email with the CODEBASE parameter set to the program, a vulnerability similar to CAN-2002-0077.
CVE-2000-0400 EXPLOITDB text WORKING POC
Microsoft Internet Explorer - Improper Input Validation
The Microsoft Active Movie ActiveX Control in Internet Explorer 5 does not restrict which file types can be downloaded, which allows an attacker to download any type of file to a user's system by encoding it within an email message or news post.
CVE-2004-0526 EXPLOITDB text WRITEUP
Internet Explorer - XSS
Unknown versions of Internet Explorer and Outlook allow remote attackers to spoof a legitimate URL in the status bar via A HREF tags with modified "alt" values that point to the legitimate site, combined with an image map whose href points to the malicious site, which facilitates a "phishing" attack.
CVE-2003-0809 EXPLOITDB text WORKING POC
Internet Explorer <6.0 - RCE
Internet Explorer 5.01 through 6.0 does not properly handle object tags returned from a Web server during XML data binding, which allows remote attackers to execute arbitrary code via an HTML e-mail message or web page.
CVE-2004-0841 EXPLOITDB text WRITEUP
Internet Explorer 6.x - RCE
Internet Explorer 6.x allows remote attackers to install arbitrary programs via mousedown events that call the Popup.show method and use drag-and-drop actions in a popup window, aka "HijackClick 3" and the "Script in Image Tag File Download Vulnerability."
CVE-2005-0053 EXPLOITDB text WRITEUP
Internet Explorer <6 - RCE
Internet Explorer 5.01, 5.5, and 6 allows remote attackers to execute arbitrary code via drag and drop events, aka the "Drag-and-Drop Vulnerability."
CVE-2003-0838 EXPLOITDB text WORKING POC
Internet Explorer - Code Injection
Internet Explorer allows remote attackers to bypass zone restrictions to inject and execute arbitrary programs by creating a popup window and inserting ActiveX object code with a "data" tag pointing to the malicious code, which Internet Explorer treats as HTML or Javascript, but later executes as an HTA application, a different vulnerability than CVE-2003-0532, and as exploited using the QHosts Trojan horse (aka Trojan.Qhosts, QHosts-1, VBS.QHOSTS, or aolfix.exe).
EIP-2026-118820 EXPLOITDB text SUSPICIOUS
Microsoft Internet Explorer 5/6 - Self Executing HTML File
EIP-2026-118827 EXPLOITDB text WORKING POC
Microsoft Internet Explorer 6 - File Attachment Script Execution
EIP-2026-118828 EXPLOITDB html WORKING POC
Microsoft Internet Explorer 6 - HTML Form Status Bar Misrepresentation
CVE-2004-1104 EXPLOITDB text WORKING POC
Microsoft Internet Explorer 6.0 SP2 - CSRF
Microsoft Internet Explorer 6.0 SP2 allows remote attackers to spoof a legitimate URL in the status bar and conduct a phishing attack via a web page that contains a BASE element that points to the legitimate site, followed by an anchor (a) element with an empty "href" attribute, and a FORM whose action points to a malicious URL, and an INPUT submit element that is modified to look like a legitimate URL.
EIP-2026-118837 EXPLOITDB html WORKING POC
Microsoft Internet Explorer 6 - Shell.Application Object Script Execution
CVE-2003-0526 EXPLOITDB text WORKING POC
Microsoft ISA Server 2000 - XSS
Cross-site scripting (XSS) vulnerability in Microsoft Internet Security and Acceleration (ISA) Server 2000 allows remote attackers to inject arbitrary web script via a URL containing the script in the domain name portion, which is not properly cleansed in the default error pages (1) 500.htm for "500 Internal Server error" or (2) 404.htm for "404 Not Found."
EIP-2026-118856 EXPLOITDB text WRITEUP
Microsoft Outlook 2000 0/98 0/Express 5.5 - Concealed Attachment
CVE-2004-0501 EXPLOITDB html WRITEUP
Outlook 2003 - CSRF
Outlook 2003 allows remote attackers to bypass intended access restrictions and cause Outlook to request a URL from a remote site via an HTML e-mail message containing a Vector Markup Language (VML) entity whose src parameter points to the remote site, which could allow remote attackers to know when a message has been read, verify valid e-mail addresses, and possibly leak other information.
CVE-2004-0502 EXPLOITDB text WRITEUP
Outlook 2003 - CSRF
Outlook 2003, when replying to an e-mail message, stores certain files in a predictable location for the "src" of an img tag of the original message, which allows remote attackers to bypass zone restrictions and exploit other issues that rely on predictable locations, as demonstrated using a shell: URI.
EIP-2026-118857 EXPLOITDB text WORKING POC
Microsoft Outlook 2003 - Security Policy Bypass