Microsoft

Internet Explorer

1637 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 90.86%
  • Published 10.03.2010 22:30:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an ...

Exploit
  • EPSS 9.31%
  • Published 18.02.2010 18:00:00
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer permits cross-origin loading of CSS stylesheets even when the stylesheet download has an incorrect MIME type and the stylesheet document is malformed, which allows remote HTTP servers to obtain sensitive information via a ...

Exploit
  • EPSS 49.26%
  • Published 04.02.2010 20:15:49
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote attackers to bypass intended access restrictions and read arbitrary files via vectors involving JavaScr...

Exploit
  • EPSS 31.39%
  • Published 04.02.2010 20:15:25
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote attackers to bypass intended access restrictions and read arbitrary files via vectors involving the pro...

  • EPSS 50.11%
  • Published 22.01.2010 22:00:00
  • Last modified 11.04.2025 00:51:21

The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not properly process input parameters, which allows remote attac...

  • EPSS 35.63%
  • Published 22.01.2010 22:00:00
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corru...

  • EPSS 33.81%
  • Published 22.01.2010 22:00:00
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Unini...

  • EPSS 33.81%
  • Published 22.01.2010 22:00:00
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Unini...

  • EPSS 29%
  • Published 22.01.2010 22:00:00
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer 5.01 SP4, 6, and 6 SP1 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory c...

  • EPSS 78.38%
  • Published 22.01.2010 22:00:00
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corru...