Show filters
78 Total Results
Displaying 1-10 of 78
Sort by:
Attacker Value
Unknown
CVE-2002-2435
Disclosure Date: December 07, 2011 (last updated October 04, 2023)
The Cascading Style Sheets (CSS) implementation in Microsoft Internet Explorer 8.0 and earlier does not properly handle the :visited pseudo-class, which allows remote attackers to obtain sensitive information about visited web pages via a crafted HTML document, a related issue to CVE-2010-2264.
0
Attacker Value
Unknown
CVE-2010-5071
Disclosure Date: December 07, 2011 (last updated October 04, 2023)
The JavaScript implementation in Microsoft Internet Explorer 8.0 and earlier does not properly restrict the set of values contained in the object returned by the getComputedStyle method, which allows remote attackers to obtain sensitive information about visited web pages by calling this method.
0
Attacker Value
Unknown
CVE-2011-2382
Disclosure Date: June 03, 2011 (last updated October 04, 2023)
Microsoft Internet Explorer 8 and earlier, and Internet Explorer 9 beta, does not properly restrict cross-zone drag-and-drop actions, which allows user-assisted remote attackers to read cookie files via vectors involving an IFRAME element with a SRC attribute containing a file: URL, as demonstrated by a Facebook game, related to a "cookiejacking" issue.
0
Attacker Value
Unknown
CVE-2010-0249
Disclosure Date: January 15, 2010 (last updated February 16, 2024)
Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote attackers to execute arbitrary code by accessing a pointer associated with a deleted object, related to incorrectly initialized memory and improper handling of objects in memory, as exploited in the wild in December 2009 and January 2010 during Operation Aurora, aka "HTML Object Memory Corruption Vulnerability."
0
Attacker Value
Unknown
CVE-2009-3671
Disclosure Date: December 09, 2009 (last updated December 08, 2023)
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3674.
0
Attacker Value
Unknown
CVE-2009-3674
Disclosure Date: December 09, 2009 (last updated December 08, 2023)
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671.
0
Attacker Value
Unknown
CVE-2009-3673
Disclosure Date: December 09, 2009 (last updated December 08, 2023)
Microsoft Internet Explorer 7 and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
0
Attacker Value
Unknown
CVE-2009-2954
Disclosure Date: August 24, 2009 (last updated October 04, 2023)
Microsoft Internet Explorer 6.0.2900.2180 and earlier allows remote attackers to cause a denial of service (CPU consumption and application hang) via JavaScript code with a long string value for the hash property (aka location.hash), a related issue to CVE-2008-5715.
0
Attacker Value
Unknown
CVE-2009-2576
Disclosure Date: July 22, 2009 (last updated October 04, 2023)
Microsoft Internet Explorer 6.0.2900.2180 and earlier allows remote attackers to cause a denial of service (CPU and memory consumption) via a long Unicode string argument to the write method, a related issue to CVE-2009-2479. NOTE: it was later reported that 7.0.6000.16473 and earlier are also affected.
0
Attacker Value
Unknown
CVE-2009-2057
Disclosure Date: June 15, 2009 (last updated October 04, 2023)
Microsoft Internet Explorer before 8 uses the HTTP Host header to determine the context of a document provided in a (1) 4xx or (2) 5xx CONNECT response from a proxy server, which allows man-in-the-middle attackers to execute arbitrary web script by modifying this CONNECT response, aka an "SSL tampering" attack.
0