CVE-2010-0027

Microsoft Internet Explorer - Code Injection

Title source: rule
STIX 2.1

Description

The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not properly process input parameters, which allows remote attackers to execute arbitrary local programs via a crafted URL, aka "URL Validation Vulnerability."

Exploits (1)

exploitdb WORKING POC VERIFIED
by Lostmon Lords · textremotewindows
https://www.exploit-db.com/exploits/33552

References (7)

Core 7
Core References
Third Party Advisory x_refsource_misc
http://www.zerodayinitiative.com/advisories/ZDI-10-016/
Third Party Advisory, VDB Entry vdb-entry signature x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8464
US Government Resource third-party-advisory x_refsource_cert
http://www.us-cert.gov/cas/techalerts/TA10-040A.html
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/509470/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/55773

Scores

EPSS 0.5010
EPSS Percentile 97.8%

Details

CWE
CWE-94
Status published
Products (18)
microsoft/internet_explorer 8
microsoft/internet_explorer 8.0.6001
microsoft/internet_explorer 7
microsoft/internet_explorer 7.0
microsoft/internet_explorer 7.0.5730 unknown
microsoft/internet_explorer 7.0.5730.11
microsoft/internet_explorer 7.00.5730.1100
microsoft/internet_explorer 7.00.6000.16386
microsoft/internet_explorer 7.00.6000.16441
microsoft/internet_explorer 5.01 sp4
... and 8 more
Published Jan 22, 2010
Tracked Since Feb 18, 2026