Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Microsoft Internet Explorer Multiple Vulnerabilities (2360131)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is missing a critical security update according to Microsoft Bulletin MS10-071.
Insight
Insight
- The browser allowing for automated, scripted instructions to simulate user actions on the AutoComplete feature, which could allow attackers to capture information previously entered into fields after the AutoComplete feature has been enabled. - An error in the way the toStaticHTML API sanitizes HTML, which could allow cross-site scripting attacks. - An error when processing CSS special characters, which could allow attackers to view content from another domain or Internet Explorer zone. - An uninitialized memory corruption error when processing malformed data, which could allow attackers to execute arbitrary code via a malicious web page. - The Anchor element not being removed from the editable HTML element during specific user operations, potentially revealing personally identifiable information intended for deletion. - The browser allowing scripts to access and read content from different domains, which could allow cross-domain scripting attacks.
Affected Software
Affected Software
Microsoft Internet Explorer version 6.x/7.x/8.x
Solution
Solution
The vendor has released updates. Please see the references for more information.