Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Microsoft Internet Explorer Multiple Vulnerabilities (2360131)

Information

Severity

Severity

Critical

Family

Family

Windows : Microsoft Bulletins

CVSSv2 Base

CVSSv2 Base

9.3

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

13 years ago

Modified

Modified

4 years ago

Summary

This host is missing a critical security update according to Microsoft Bulletin MS10-071.

Insight

Insight

- The browser allowing for automated, scripted instructions to simulate user actions on the AutoComplete feature, which could allow attackers to capture information previously entered into fields after the AutoComplete feature has been enabled. - An error in the way the toStaticHTML API sanitizes HTML, which could allow cross-site scripting attacks. - An error when processing CSS special characters, which could allow attackers to view content from another domain or Internet Explorer zone. - An uninitialized memory corruption error when processing malformed data, which could allow attackers to execute arbitrary code via a malicious web page. - The Anchor element not being removed from the editable HTML element during specific user operations, potentially revealing personally identifiable information intended for deletion. - The browser allowing scripts to access and read content from different domains, which could allow cross-domain scripting attacks.

Affected Software

Affected Software

Microsoft Internet Explorer version 6.x/7.x/8.x

Solution

Solution

The vendor has released updates. Please see the references for more information.