Product:

Internet_explorer

(Microsoft)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 1640
Date Id Summary Products Score Patch Annotated
2013-08-14 CVE-2013-3186 The Protected Mode feature in Microsoft Internet Explorer 7 through 10 on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly implement the Integrity Access Level (aka IL) protection mechanism, which allows remote attackers to obtain medium-integrity privileges by leveraging access to a low-integrity process, aka "Process Integrity Level Assignment Vulnerability." Internet_explorer N/A
1999-09-01 CVE-1999-0891 The "download behavior" in Internet Explorer 5 allows remote attackers to read arbitrary files via a server-side redirect. Internet_explorer N/A
2000-06-27 CVE-2000-0596 Internet Explorer 5.x does not warn a user before opening a Microsoft Access database file that is referenced within ActiveX OBJECT tags in an HTML document, which could allow remote attackers to execute arbitrary commands, aka the "IE Script" vulnerability. Internet_explorer N/A
1999-05-06 CVE-1999-1367 Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not use standard cache controls, which could allow users on the same system to access restricted web sites that were visited by other users. Internet_explorer N/A
1999-05-27 CVE-1999-0917 The Preloader ActiveX control used by Internet Explorer allows remote attackers to read arbitrary files. Internet_explorer N/A
1999-05-27 CVE-1999-0802 Buffer overflow in Internet Explorer 5 allows remote attackers to execute commands via a malformed Favorites icon. Internet_explorer N/A
1999-08-21 CVE-1999-0668 The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. Internet_explorer N/A
1999-09-10 CVE-1999-0702 Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability. Internet_explorer N/A
1999-10-01 CVE-1999-0877 Internet Explorer 5 allows remote attackers to read files via an ExecCommand method called on an IFRAME. Internet_explorer N/A
1999-10-21 CVE-1999-0766 The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment. Internet_explorer, Java_virtual_machine N/A