Internet explorer Vulnerabilities
Security vulnerability tracking for Microsoft Internet explorer
2
0
2
0
Vulnerability Timeline
2 vulnerabilities discovered over time for Internet explorer
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2020-1380 | 7.8 | This vulnerability allows an attacker to run any code they choose on a victim's computer, potentially giving them full control if the user has administrative rights. To exploit it, the attacker needs the victim to visit a specially crafted website or open a document that uses Internet Explorer's rendering engine. | microsoftinternet explorer | Exploit Available | over 5 years agoAug 17, 2020 |
| CVE-2019-1133 | 7.5 | This vulnerability allows an attacker to run any code they choose on a victim's computer if the victim visits a malicious website or opens a compromised document in Internet Explorer. If the victim has administrative rights, the attacker could take full control of the system, install software, and access or delete files. | microsoftinternet explorer | Exploit Available | over 6 years agoAug 14, 2019 |
About Microsoft Internet explorer Security
This page provides comprehensive security vulnerability tracking for Microsoft Internet explorer. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Internet explorer updated to the latest version
- • Subscribe to security advisories from Microsoft
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately