Buffer overflow in Microsoft Internet Explorer 5.01, 5.5, and 6.0 allows remote attackers to execute arbitrary code via / (slash) characters in the Type property of an Object tag in a web page.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2003-July/006401.html - | |
References | () http://marc.info/?l=bugtraq&m=105476381609135&w=2 - | |
References | () http://secunia.com/advisories/8943 - | |
References | () http://www.eeye.com/html/Research/Advisories/AD20030604.html - Patch, Vendor Advisory | |
References | () http://www.kb.cert.org/vuls/id/679556 - US Government Resource | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-020 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A922 - |
Information
Published : 2003-06-16 04:00
Updated : 2024-11-20 23:44
NVD link : CVE-2003-0344
Mitre link : CVE-2003-0344
CVE.ORG link : CVE-2003-0344
JSON object : View
Products Affected
microsoft
- internet_explorer
- ie
CWE