jasminecorp.net directory
Updated Blogs
More .....



 
 

| Add Search | Advertise With JCSearch | Suggest a Site

Search the Web


Search Results

Security
Directory > Computers > Software > Internet > Clients > WWW > Browsers > Microsoft Internet Explorer > Security

Web Sitesi

Privacy Secrets of MicroSoft's Internet Explorer
Security and internet privacy issues of Global Histories, Cookies, and Cache while browsing with
Mac Explorer 5.0

http://phaster.com/unpretentious/browsing_micro$oft.html
Reviews Rating: Not yet Rated Whois Check

Microsoft Internet Explorer (3.0): Cache Vulnerability
Discusses a vulnerability whereby pages delivered via SSL are left in clear in Explorer's disk
cache and may be (trivially) retrieved by anyone with access to the machine.

http://www.brd.ie/papers/mscache/mscache.html
Reviews Rating: Not yet Rated Whois Check

IE Clipboard Stealing
"Since Microsoft Internet Explorer ("IE") version 5.0, there has been a way to read
and set the users clipboard text from script, by default, and with no prompting. This can be handy
for web-based applications to do so, but can be used in a malicious way to steal the clipboard
contents if the option is not changed."

http://tom.me.uk/clipboard/
Reviews Rating: Not yet Rated Whois Check

PivX Solutions: IE Allows Universal Cross Domain Scripting
"The object property of embedded WebBrowser controls is not subject to the Cross Domain
security checks that embedded HTML documents ordinarily go through, and as such it is possible to
escape any sandboxing and security zone restrictions."

http://www.pivx.com/larholm/adv/TL003/
Reviews Rating: Not yet Rated Whois Check

Retrieving Information on Local Files in IE
Explains how the IMG element's dynsrc attribute can be exploited to test the existence of, find the
size of, find the date last updated/modified of, and the creation date of, an arbitrary local file.
By GreyMagic Security.

http://sec.greymagic.com/adv/gm003-ie/
Reviews Rating: Not yet Rated Whois Check

Executing Arbitrary Commands Without Active Scripting or ActiveX
Advisory by GreyMagic Security explains how a vulnerability in elements can be exploited with data
binding.

http://sec.greymagic.com/adv/gm001-ie/
Reviews Rating: Not yet Rated Whois Check

GreyMagic Security: Appendix to "IE allows universal Cross Site Scripting"
Explains how the "ANALYZE.DLG" resource can be manipulated to allow the execution of
arbitrary code in the My Computer" zone.

http://sec.greymagic.com/adv/gm001-ax/
Reviews Rating: Not yet Rated Whois Check

CNET: Buffer-overflow Bug in IE
"Microsoft is urging users of its Internet Explorer browser to download a patch for a newly
discovered buffer-overflow security bug. The bug takes advantage of the way some versions of the IE
browser handle long strings of JScript code."

http://news.com.com/2100-1001-214620.html
Reviews Rating: Not yet Rated Whois Check

Microsoft Internet Explorer 4.x 5.x - Frame Loop Vulnerability
Advisory by USSR: "It is possible to create a malicious webpage that when visited by an IE
user all of their system resources are devoured and depending on the system its possible that the
machine can even crash and reboot itself."

http://www.ussrback.com/iehole/
Reviews Rating: Not yet Rated Whois Check

Unpatched IE Vulnerabilities
Unpatched vulnerabilities, references, and examples
http://www.jscript.dk/unpatched/
Reviews Rating: Not yet Rated Whois Check

The Register: Three New MS Security Holes - Two Nasty
Includes: MSXML may ignore IE security zone settings during a request for data from a Web site; and
a VBscript problem which allows an attacker to read files on a victim's local drive, or eavesdrop
on his browsing session.

http://www.theregister.co.uk/content/55/24168.html
Reviews Rating: Not yet Rated Whois Check

The Register: IE, Outlook Run Malicious Commands Without Scripting
An attacker can run arbitrary commands on Windows machines with a simple bit of HTML, an Israeli
security researcher has demonstrated. The exploit will work with IE, Outlook and Outlook Express
even if active scripting and ActiveX are disabled in the browser security settings.

http://www.theregister.co.uk/content/55/24274.html
Reviews Rating: Not yet Rated Whois Check

The Register: Cumulative IE Patch for Maicious Cookies
A fairly serious flaw in Internet Explorer which would enable a malicious Web page or e-mail to
drop a cookie containing an HTML script on a victim's machine and run it in the 'Local Computer'
zone rather than the Internet zone to avoid restrictions has just been patched.

http://www.theregister.co.uk/content/55/24653.html
Reviews Rating: Not yet Rated Whois Check

The Register: MS Security Patch Fails on Local Files
The MS patch intended to fix a data binding flaw in IE, which enables a script to call executables
on your Windows machine using the object tag, does not protect against malicious files launched
from a local directory.

http://www.theregister.co.uk/content/55/24667.html
Reviews Rating: Not yet Rated Whois Check

Wired News: IE Hole Surrenders Your Computer
An attacker can gain control of another user's machine using an HTML-formatted e-mail with an
attachment that contains a small remote-control program. The e-mail can be sent directly to the
victim, or can be placed on a website.

http://www.wired.com/news/technology/0,1282,42750,00.html
Reviews Rating: Not yet Rated Whois Check

Wired News: IE Hole-Finder in Odd Position
A hacker who discovered a potentially devastating security hole in Microsoft's Internet Explorer
says he has found himself in the undesired position of providing technical support to people who
cannot install the patch that Microsoft released to fix the flaw.

http://www.wired.com/news/technology/0,1282,42798,00.html
Reviews Rating: Not yet Rated Whois Check

Wired News: IE Bug Can Lead to Strange Search
Describes a security hole which can be exploited to change users' search sites or to serve up
offensive ads.

http://www.wired.com/news/infostructure/0,1377,48177,00.html
Reviews Rating: Not yet Rated Whois Check

Windows Security Guide: Internet Explorer
Descriptions, and patch information, for vulnerabilities affecting various versions of this
browser.

http://www.winguides.com/security/category.php/5/
Reviews Rating: Not yet Rated Whois Check

CIAC: Microsoft Internet Explorer-Content Type Falsification (Three Vulnerabilities)
Detailed explanation and workaround of these vulnerabilities affecting I.E 5.5 and 6.
http://www.ciac.org/ciac/bulletins/m-027.shtml
Reviews Rating: Not yet Rated Whois Check

CERT Advisory: Buffer Overflow in Microsoft Internet Explorer
Provides an overview and solutions to this vulnerability which, theoretically, affects all
applications utilizing the Internet Explorer HTML rendering engine.

http://www.cert.org/advisories/CA-2002-04.html
Reviews Rating: Not yet Rated Whois Check

Internet Explorer Security Pro
Internet Explorer Security is a utility that customizes aspects of the Internet Explorer Web
browser.

http://www.mybestsoft.com/iesec/index.html
Reviews Rating: Not yet Rated Whois Check

Microsoft: Q167614 - Update Available For "Frame Spoof" Security Issue
An update that addresses a potential security issue with regard to the use of frames in Internet
Explorer.

http://support.microsoft.com/support/kb/articles/q167/6/14.asp
Reviews Rating: Not yet Rated Whois Check

Scott Schnoll's Internet Explorer Security
Information on Internet and web browser security as well as Microsoft Internet Explorer security
features and flaws.

http://www.nwnetworks.com/iesc.html
Reviews Rating: Not yet Rated Whois Check

ActiveBackgrounds
Secure browser and desktop interface for windows.
http://active.ibusinessdot.com
Reviews Rating: Not yet Rated Whois Check

 


Jasminecorp.net directory is based on the Open Directory and is being modified by Jasminecorp.

©2004 Jasmine Computers Inc.

Click here to subscribe for Jasminecorp's product News.

Home | JCBid |Software Development | Domain Registration | Hosting | Web Designing | Buy Books | Advertise with JCSearch | Whois | IP Locator | Add Search | Shopping | Store | Free Blogs | Free GuestBook | Free E-Cards | Free Games | Free Tutorials | Set as Home | Add to Favorite | Suggest a Site | Directory | Our Portfolio | Terms of service | Free quote | Tell a Friend | Special Offer | Job Opportunities | games | Usenet Groups

Submit a Site to Jasminecorp.net Directory || Advertise with us

 

Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor
Get a Domain Name:
.com .us .info
.org .in .name
.net .biz .asia