Total vulnerabilities in the database
Internet Explorer 5.0, 5.0.1 and 5.5 with JavaScript execution enabled allows remote attackers to determine the existence of arbitrary files via a script tag with a src parameter that references a non-JavaScript file, then using the onError event handler to monitor the results.
Software | From | Fixed in |
---|---|---|
microsoft / internet_explorer | 5.5-sp2 | 5.5-sp2.x |
microsoft / internet_explorer | 5.0 | 5.0.x |
microsoft / internet_explorer | 5.0.1 | 5.0.1.x |
microsoft / internet_explorer | 5.0.1-sp2 | 5.0.1-sp2.x |
microsoft / internet_explorer | 5.0.1-sp1 | 5.0.1-sp1.x |
microsoft / internet_explorer | 5.5 | 5.5.x |
microsoft / internet_explorer | 6.0 | 6.0.x |