CVE-2005-1790

N/A Unknown
Published: June 01, 2005 Modified: April 16, 2026
View on NVD

Description

Microsoft Internet Explorer 6 SP2 6.0.2900.2180 and 6.0.2800.1106, and earlier versions, allows remote attackers to cause a denial of service (crash) and execute arbitrary code via a Javascript BODY onload event that calls the window function, aka "Mismatched Document Object Model Objects Memory Corruption Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/15368
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/15546
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18064
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/18311
Source: cve@mitre.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/887861
Source: cve@mitre.org
US Government Resource
http://www.us-cert.gov/cas/techalerts/TA05-347A.html
Source: cve@mitre.org
US Government Resource
http://www.vupen.com/english/advisories/2005/2509
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2005/2867
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2005/2909
Source: cve@mitre.org
Vendor Advisory
http://marc.info/?l=bugtraq&m=111746394106172&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=111755552306013&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/15368
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/15546
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18064
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/18311
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1015251
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2005-234.pdf
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.computerterrorism.com/research/ie/ct21-11-2005
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/887861
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.securityfocus.com/archive/1/417326/30/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/13799
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA05-347A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2005/2509
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2005/2867
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2005/2909
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

48 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
81.6%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft