Internet Explorer allows remote attackers to bypass zone restrictions to inject and execute arbitrary programs by creating a popup window and inserting ActiveX object code with a "data" tag pointing to the malicious code, which Internet Explorer treats as HTML or Javascript, but later executes as an HTA application, a different vulnerability than CVE-2003-0532, and as exploited using the QHosts Trojan horse (aka Trojan.Qhosts, QHosts-1, VBS.QHOSTS, or aolfix.exe).
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T02:05:12.549Z

Reserved: 2003-10-02T00:00:00

Link: CVE-2003-0838

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2003-11-17T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2003-0838

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses