Vulnerabilities > Microsoft > Internet Explorer > Critical

DATE CVE VULNERABILITY TITLE RISK
2010-11-05 CVE-2010-3962 Use After Free vulnerability in Microsoft Internet Explorer 6/7/8
Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
network
microsoft CWE-416
critical
9.3
2010-10-13 CVE-2010-3326 Code Injection vulnerability in Microsoft Internet Explorer 6
Microsoft Internet Explorer 6 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
network
microsoft CWE-94
critical
9.3
2010-08-17 CVE-2009-3737 Code Injection vulnerability in Oracle Siebel Option Pack IE Activex Control
The Oracle Siebel Option Pack for IE ActiveX control does not properly initialize memory that is used by the NewBusObj method, which allows remote attackers to execute arbitrary code via a crafted HTML document.
network
oracle microsoft CWE-94
critical
9.3
2010-08-11 CVE-2010-2556 Use of Uninitialized Resource vulnerability in Microsoft Internet Explorer 6/7/8
Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
network
microsoft CWE-908
critical
9.3
2010-08-11 CVE-2010-2557 Use of Uninitialized Resource vulnerability in Microsoft Internet Explorer 6
Microsoft Internet Explorer 6 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
network
microsoft CWE-908
critical
9.3
2010-08-11 CVE-2010-2558 Race Condition vulnerability in Microsoft Internet Explorer 6/7/8
Race condition in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to an object in memory, aka "Race Condition Memory Corruption Vulnerability."
network
microsoft CWE-362
critical
9.3
2010-08-11 CVE-2010-2559 Use of Uninitialized Resource vulnerability in Microsoft Internet Explorer 8
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerability," a different vulnerability than CVE-2009-3671, CVE-2009-3674, CVE-2010-0245, and CVE-2010-0246.
network
microsoft CWE-908
critical
9.3
2010-08-11 CVE-2010-2560 Out-of-bounds Write vulnerability in Microsoft Internet Explorer 6/7/8
Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Layout Memory Corruption Vulnerability."
network
microsoft CWE-787
critical
9.3
2010-03-31 CVE-2010-0491 Resource Management Errors vulnerability in Microsoft products
Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, and 6 SP1 allows remote attackers to execute arbitrary code by changing unspecified properties of an HTML object that has an onreadystatechange event handler, aka "HTML Object Memory Corruption Vulnerability."
network
microsoft CWE-399
critical
9.3
2010-03-31 CVE-2010-0805 Code Injection vulnerability in Microsoft Internet Explorer, Windows 2000 and Windows XP
The Tabular Data Control (TDC) ActiveX control in Microsoft Internet Explorer 5.01 SP4, 6 on Windows XP SP2 and SP3, and 6 SP1 allows remote attackers to execute arbitrary code via a long URL (DataURL parameter) that triggers memory corruption in the CTDCCtl::SecurityCHeckDataURL function, aka "Memory Corruption Vulnerability."
network
microsoft CWE-94
critical
9.3