First published: Wed Dec 11 2002(Updated: )
Internet Explorer 5.01 through 6.0 allows remote attackers to identify the path to the Temporary Internet Files folder and obtain user information such as cookies via certain uses of the OBJECT tag, which are not subjected to the proper security checks, aka "Temporary Internet Files folders Name Reading."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | =5.5-sp2 | |
Internet Explorer | =5.0.1 | |
Internet Explorer | =5.0.1-sp2 | |
Internet Explorer | =5.0.1-sp1 | |
Internet Explorer | =5.5 | |
Internet Explorer | =5.5-sp1 | |
Internet Explorer | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1188 is considered a moderate severity vulnerability due to the potential exposure of sensitive user information.
To fix CVE-2002-1188, users should upgrade to a more secure version of Internet Explorer that is not affected by this vulnerability.
CVE-2002-1188 affects Internet Explorer versions 5.0.1 through 6.0, including all service packs for 5.5.
CVE-2002-1188 enables remote attackers to reveal the path to the Temporary Internet Files folder and obtain user information like cookies.
Yes, CVE-2002-1188 may compromise user privacy by allowing attackers to access sensitive data stored in Temporary Internet Files.