Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2004-0380
Description:The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote attackers to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references the InfoTech Storage (ITS) protocol handlers such as (1) ms-its, (2) ms-itss, (3) its, or (4) mk:@MSITStore, aka the "MHTML URL Processing Vulnerability."
Test IDs: 1.3.6.1.4.1.25623.1.0.12208  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2004-0380
BugTraq ID: 9105
http://www.securityfocus.com/bid/9105
BugTraq ID: 9658
http://www.securityfocus.com/bid/9658
Bugtraq: 20040219 Microsoft Internet Explorer Unspecified CHM File Processing Arbitrary Code Execution Vulnerability (bid 9658) (Google Search)
http://www.securityfocus.com/archive/1/354447
Bugtraq: 20040328 IE ms-its: and mk:@MSITStore: vulnerability (Google Search)
http://www.securityfocus.com/archive/1/358913
Cert/CC Advisory: TA04-099A
Cert/CC Advisory: TA04-104A
http://www.us-cert.gov/cas/techalerts/TA04-104A.html
CERT/CC vulnerability note: VU#323070
http://www.kb.cert.org/vuls/id/323070
http://www.k-otik.net/bugtraq/02.18.InternetExplorer.php
Microsoft Security Bulletin: MS04-013
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2004/ms04-013
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1010
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1028
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A882
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A990
http://secunia.com/advisories/10523
XForce ISS Database: outlook-mhtml-execute-code(15705)
https://exchange.xforce.ibmcloud.com/vulnerabilities/15705




© 1998-2025 E-Soft Inc. All rights reserved.