Vulnerabilities > Microsoft > Internet Explorer > 7

DATE CVE VULNERABILITY TITLE RISK
2008-06-30 CVE-2008-2948 Unspecified vulnerability in Microsoft Internet Explorer 7/8
Cross-domain vulnerability in Microsoft Internet Explorer 7 and 8 allows remote attackers to change the location property of a frame via the Object data type, and use a frame from a different domain to observe domain-independent events, as demonstrated by observing onkeydown events with caballero-listener.
network
microsoft
6.8
2008-06-30 CVE-2008-2947 Improper Access Control vulnerability in Microsoft Internet Explorer 5.01/6/7
Cross-domain vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, and 7 allows remote attackers to access restricted information from other domains via JavaScript that uses the Object data type for the value of a (1) location or (2) location.href property, related to incorrect determination of the origin of web script, aka "Window Location Property Cross-Domain Vulnerability." NOTE: according to Microsoft, CVE-2008-2948 and CVE-2008-2949 are duplicates of this issue, probably different attack vectors.
network
microsoft CWE-284
6.8
2008-06-12 CVE-2008-1442 Buffer Errors vulnerability in Microsoft Internet Explorer 6/7
Heap-based buffer overflow in the substringData method in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code, related to an unspecified manipulation of a DOM object before a call to this method, aka the "HTML Objects Memory Corruption Vulnerability."
network
microsoft CWE-119
critical
9.3
2008-06-03 CVE-2008-2540 Permissions, Privileges, and Access Controls vulnerability in Apple Safari
Apple Safari on Mac OS X, and before 3.1.2 on Windows, does not prompt the user before downloading an object that has an unrecognized content type, which allows remote attackers to place malware into the (1) Desktop directory on Windows or (2) Downloads directory on Mac OS X, and subsequently allows remote attackers to execute arbitrary code on Windows by leveraging an untrusted search path vulnerability in (a) Internet Explorer 7 on Windows XP or (b) the SearchPath function in Windows XP, Vista, and Server 2003 and 2008, aka a "Carpet Bomb" and a "Blended Threat Elevation of Privilege Vulnerability," a different issue than CVE-2008-1032.
network
apple microsoft CWE-264
critical
9.3
2008-05-12 CVE-2008-2159 Information Exposure vulnerability in Microsoft Internet Explorer 7
Microsoft Internet Explorer 7 can save encrypted pages in the cache even when the DisableCachingOfSSLPages registry setting is enabled, which might allow local users to obtain sensitive information.
local
low complexity
microsoft CWE-200
2.1
2008-04-23 CVE-2007-6255 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Microsoft products
Buffer overflow in the Microsoft HeartbeatCtl ActiveX control in HRTBEAT.OCX allows remote attackers to execute arbitrary code via the Host argument to an unspecified method.
network
microsoft CWE-119
critical
9.3
2008-04-08 CVE-2008-1085 Code Injection vulnerability in Microsoft IE and Internet Explorer
Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream that triggers memory corruption, as demonstrated using an invalid MIME-type that does not have a registered handler.
network
microsoft CWE-94
critical
9.3
2008-02-13 CVE-2008-0751 Cross-Site Scripting vulnerability in S9Y Serendipity Event Freetag
Cross-site scripting (XSS) vulnerability in the Freetag before 2.96 plugin for S9Y Serendipity, when using Internet Explorer 6 or 7, allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to plugin/tag/.
network
microsoft s9y CWE-79
4.3
2008-02-12 CVE-2008-0078 Code Injection vulnerability in Microsoft Activex, IE and Internet Explorer
Unspecified vulnerability in an ActiveX control (dxtmsft.dll) in Microsoft Internet Explorer 5.01, 6 SP1 and SP2, and 7 allows remote attackers to execute arbitrary code via a crafted image, aka "Argument Handling Memory Corruption Vulnerability."
network
microsoft CWE-94
critical
9.3
2008-02-12 CVE-2008-0077 Use After Free vulnerability in Microsoft Internet Explorer 6/7
Use-after-free vulnerability in Microsoft Internet Explorer 6 SP1, 6 SP2, and and 7 allows remote attackers to execute arbitrary code by assigning malformed values to certain properties, as demonstrated using the by property of an animateMotion SVG element, aka "Property Memory Corruption Vulnerability."
network
low complexity
microsoft CWE-416
8.8