Vulnerabilities > Microsoft > Internet Explorer

DATE CVE VULNERABILITY TITLE RISK
2005-12-14 CVE-2005-2829 Unspecified vulnerability in Microsoft IE and Internet Explorer
Multiple design errors in Microsoft Internet Explorer 5.01, 5.5, and 6 allow user-assisted attackers to execute arbitrary code by (1) overlaying a malicious new window above a file download box, then (2) using a keyboard shortcut and delaying the display of the file download box until the user hits a shortcut that activates the "Run" button, aka "File Download Dialog Box Manipulation Vulnerability."
network
high complexity
microsoft
5.1
2005-12-08 CVE-2005-4089 Permissions, Privileges, and Access Controls vulnerability in Microsoft IE and Internet Explorer
Microsoft Internet Explorer allows remote attackers to bypass cross-domain security restrictions and obtain sensitive information by using the @import directive to download files from other domains that are not valid Cascading Style Sheets (CSS) files, as demonstrated using Google Desktop, aka "CSSXSS" and "CSS Cross-Domain Information Disclosure Vulnerability."
network
microsoft CWE-264
7.1
2005-10-26 CVE-2005-3312 Unspecified vulnerability in Microsoft Internet Explorer 6.0
The HTML rendering engine in Microsoft Internet Explorer 6.0 allows remote attackers to conduct cross-site scripting (XSS) attacks via HTML in corrupted images and other files such as .GIF, JPG, and WAV, which is rendered as HTML when the user clicks on the link, even though the web server response and file extension indicate that it should be treated as a different file type.
network
microsoft
4.3
2005-08-10 CVE-2005-1990 Unspecified vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, including (1) devenum.dll, (2) diactfrm.dll, (3) wmm2filt.dll, (4) fsusd.dll, (5) dmdskmgr.dll, (6) browsewm.dll, (7) browseui.dll, (8) shell32.dll, (9) mshtml.dll, (10) inetcfg.dll, (11) infosoft.dll, (12) query.dll, (13) syncui.dll, (14) clbcatex.dll, (15) clbcatq.dll, (16) comsvcs.dll, and (17) msconf.dll, which causes memory corruption, aka "COM Object Instantiation Memory Corruption Vulnerability," a different vulnerability than CVE-2005-2087.
network
high complexity
microsoft
5.1
2005-08-10 CVE-2005-1989 Unspecified vulnerability in Microsoft IE and Internet Explorer
Unknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to obtain information and possibly execute code when browsing from a web site to a web folder view using WebDAV, aka "Web Folder Behaviors Cross-Domain Vulnerability".
network
low complexity
microsoft
7.5
2005-08-10 CVE-2005-1988 Unspecified vulnerability in Microsoft IE and Internet Explorer
Unknown vulnerability in Internet Explorer 5.0, 5.5, and 6.0 allows remote attackers to execute arbitrary code via a web site or an HTML e-mail containing a crafted JPEG image that causes memory corruption, aka "JPEG Image Rendering Memory Corruption Vulnerability".
network
high complexity
microsoft
5.1
2005-07-19 CVE-2005-2304 Unspecified vulnerability in Microsoft Internet Explorer and Live Messenger
Microsoft MSN Messenger 9.0 and Internet Explorer 6.0 allows remote attackers to cause a denial of service (crash) via an image with an ICC Profile with a large Tag Count.
network
low complexity
microsoft
5.0
2005-07-13 CVE-2005-2274 Unspecified vulnerability in Microsoft Internet Explorer 6.0
Microsoft Internet Explorer 6.0 does not clearly associate a Javascript dialog box with the web page that generated it, which allows remote attackers to spoof a dialog box from a trusted site and facilitates phishing attacks, aka the "Dialog Origin Spoofing Vulnerability."
network
high complexity
microsoft
2.6
2005-07-05 CVE-2005-2087 Resource Management Errors vulnerability in Microsoft IE and Internet Explorer
Internet Explorer 5.01 SP4 up to 6 on various Windows operating systems, including IE 6.0.2900.2180 on Windows XP, allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not ActiveX controls, as demonstrated using the JVIEW Profiler (Javaprxy.dll).
network
low complexity
microsoft CWE-399
5.0
2005-06-14 CVE-2005-1211 Unspecified vulnerability in Microsoft Internet Explorer 6.0.2900
Buffer overflow in the PNG image rendering component of Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted PNG file.
network
high complexity
microsoft
5.1