Internet Explorer allows remote attackers to bypass zone restrictions to inject and execute arbitrary programs by creating a popup window and inserting ActiveX object code with a "data" tag pointing to the malicious code, which Internet Explorer treats as HTML or Javascript, but later executes as an HTA application, a different vulnerability than CVE-2003-0532, and as exploited using the QHosts Trojan horse (aka Trojan.Qhosts, QHosts-1, VBS.QHOSTS, or aolfix.exe).
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T02:05:12.549Z
Reserved: 2003-10-02T00:00:00
Link: CVE-2003-0838
No data.
Status : Deferred
Published: 2003-11-17T05:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2003-0838
No data.
OpenCVE Enrichment
No data.
Weaknesses