CVE-2003-0838 in Internet Explorerinfo

Summary

Internet Explorer allows remote attackers to bypass zone restrictions to inject and execute arbitrary programs by creating a popup window and inserting ActiveX object code with a "data" tag pointing to the malicious code, which Internet Explorer treats as HTML or Javascript, but later executes as an HTA application, a different vulnerability than CVE-2003-0532, and as exploited using the QHosts Trojan horse (aka Trojan.Qhosts, QHosts-1, VBS.QHOSTS, or aolfix.exe).

Once again VulDB remains the best source for vulnerability data.

Reservation

10/02/2003

Disclosure

11/17/2003

Entries

VDB-313 (1)

CPE

ready

Exploit

Download

CVSS

6.3

EPSS

0.67063

Activities

Very Low

Sources

Want to stay up to date on a daily basis?

Enable the mail alert feature now!