Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Internet_explorer
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 1640 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2013-08-14 | CVE-2013-3186 | The Protected Mode feature in Microsoft Internet Explorer 7 through 10 on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly implement the Integrity Access Level (aka IL) protection mechanism, which allows remote attackers to obtain medium-integrity privileges by leveraging access to a low-integrity process, aka "Process Integrity Level Assignment Vulnerability." | Internet_explorer | N/A | ||
1999-09-01 | CVE-1999-0891 | The "download behavior" in Internet Explorer 5 allows remote attackers to read arbitrary files via a server-side redirect. | Internet_explorer | N/A | ||
2000-06-27 | CVE-2000-0596 | Internet Explorer 5.x does not warn a user before opening a Microsoft Access database file that is referenced within ActiveX OBJECT tags in an HTML document, which could allow remote attackers to execute arbitrary commands, aka the "IE Script" vulnerability. | Internet_explorer | N/A | ||
1999-05-06 | CVE-1999-1367 | Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not use standard cache controls, which could allow users on the same system to access restricted web sites that were visited by other users. | Internet_explorer | N/A | ||
1999-05-27 | CVE-1999-0917 | The Preloader ActiveX control used by Internet Explorer allows remote attackers to read arbitrary files. | Internet_explorer | N/A | ||
1999-05-27 | CVE-1999-0802 | Buffer overflow in Internet Explorer 5 allows remote attackers to execute commands via a malformed Favorites icon. | Internet_explorer | N/A | ||
1999-08-21 | CVE-1999-0668 | The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. | Internet_explorer | N/A | ||
1999-09-10 | CVE-1999-0702 | Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability. | Internet_explorer | N/A | ||
1999-10-01 | CVE-1999-0877 | Internet Explorer 5 allows remote attackers to read files via an ExecCommand method called on an IFRAME. | Internet_explorer | N/A | ||
1999-10-21 | CVE-1999-0766 | The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment. | Internet_explorer, Java_virtual_machine | N/A |