Explorer32++ version 1.3.5.531 suffers from a buffer overflow vulnerability.
f80b4a69256c38987b58c51bee5f679412107e689665abba0114e994ae24cb15
Explorer version 7.20 RC1 revision A suffers from a cross site scripting vulnerability.
3ce1da83732891b15c50124372e4da9f3a6226565203b6cb0c2c688128c32dd9
Microsoft Windows Explorer unspecified .zip file denial of service exploit.
f531da1c186536d9933cd94757784b725cc87f4068f41e960b5a3c55ffcbe704
Microsoft Windows Explorer.exe GIF image denial of service exploit.
996d91f30bc8637ae8556daa3d6c9549c064a67e102aa1677cb5d01083b38cf9
Explorer.exe version 6.00.2900.2180 suffers from a buffer overflow vulnerability.
0ef909240a80f33f33969d55670911c0b5c3a8e387c86025576087057b4d4972
All versions of ExplorerXP suffer cross site scripting and directory traversal flaws. Written in French.
13ea3c716c7168598c296075e5b0c01df9475c8fb2d5e2692c305bd486810b68
Windows Explorer is susceptible to a denial of service issue in its handling of image files.
4ff58ed58e4aeaec72fc7f40f628b2f9d4c800d12d76392ee96a26908fefd75f
Windows fails to handle long share names when accessing a remote file servers such as samba, allowing a malicious server to crash the clients explorer and the ability to execute arbitrary code in the machine as the current user (usually with Administrator rights on Windows machines). Verified to still work on IE 5.0.3700.1000 on Win2k SP4. The author originally notified Microsoft in early 2002.
732e3e74f77ebd64d1be72f860691364496a6715edd0d0138eaa48142e8c84ea