Microsoft Internet Explorer (IE) Popular web browser for windows
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Microsoft Internet Explorer (IE).
Recent Microsoft Internet Explorer (IE) Security Advisories
| Advisory | Title | Published |
|---|---|---|
| CVE-2025-21326 | CVE-2025-21326 Internet Explorer Remote Code Execution Vulnerability | January 14, 2025 |
EOL Dates
Ensure that you are using a supported version of Microsoft Internet Explorer (IE). Here are some end of life, and end of support dates for Microsoft Internet Explorer (IE).
| Release | EOL Date | Status |
|---|---|---|
| 11-embedded | October 14, 2031 |
Active
Microsoft Internet Explorer (IE) 11-embedded will become EOL in 5 years (in 2031). |
| 11-server | October 14, 2031 |
Active
Microsoft Internet Explorer (IE) 11-server will become EOL in 5 years (in 2031). |
| 11-ltsc | October 14, 2031 |
Active
Microsoft Internet Explorer (IE) 11-ltsc will become EOL in 5 years (in 2031). |
| 11-ltsb | October 14, 2031 |
Active
Microsoft Internet Explorer (IE) 11-ltsb will become EOL in 5 years (in 2031). |
| 11 | June 14, 2022 |
EOL
Microsoft Internet Explorer (IE) 11 became EOL in 2022. |
| 10 | January 31, 2020 |
EOL
Microsoft Internet Explorer (IE) 10 became EOL in 2020. |
| 9 | January 12, 2016 |
EOL
Microsoft Internet Explorer (IE) 9 became EOL in 2016. |
| 8 | January 12, 2016 |
EOL
Microsoft Internet Explorer (IE) 8 became EOL in 2016. |
| 7 | October 10, 2023 |
EOL
Microsoft Internet Explorer (IE) 7 became EOL in 2023. |
By the Year
In 2026 there have been 0 vulnerabilities in Microsoft Internet Explorer (IE). Last year, in 2025 Internet Explorer (IE) had 2 security vulnerabilities published. Right now, Internet Explorer (IE) is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 2 | 7.65 |
| 2024 | 2 | 7.50 |
| 2023 | 1 | 6.50 |
| 2022 | 0 | 0.00 |
| 2021 | 2 | 8.80 |
| 2020 | 22 | 7.29 |
| 2019 | 28 | 6.98 |
| 2018 | 46 | 6.70 |
It may take a day or so for new Internet Explorer (IE) vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Microsoft Internet Explorer (IE) Security Vulnerabilities
Transient DOS via Incorrect Cipher Key in OTA Registration (IE)
CVE-2024-49847
7.5 - High
- May 06, 2025
Transient DOS while processing of a registration acceptance OTA due to incorrect ciphering key data IE.
Out-of-bounds Read
Jan 2025: Internet Explorer Remote Code Execution Vulnerability
CVE-2025-21326
7.8 - High
- January 14, 2025
Internet Explorer Remote Code Execution Vulnerability
Object Type Confusion
Internet Explorer Transient DOS via TID-to-Link Mapping IE Elements
CVE-2024-33020
7.5 - High
- August 05, 2024
Transient DOS while processing TID-to-link mapping IE elements.
Transient DoS via IE file parser (len=1)
CVE-2023-43536
7.5 - High
- February 06, 2024
Transient DOS while parse fils IE with length equal to 1.
Windows MSHTML Security Feature Bypass (CVE-2023-29324)
CVE-2023-29324
6.5 - Medium
- May 09, 2023
Windows MSHTML Platform Security Feature Bypass Vulnerability
Mar 2021: Internet Explorer Remote Code Execution Vulnerability
CVE-2021-27085
8.8 - High
- March 11, 2021
Internet Explorer Remote Code Execution Vulnerability
Mar 2021: Internet Explorer Memory Corruption Vulnerability
CVE-2021-26411
8.8 - High
- March 11, 2021
Internet Explorer Memory Corruption Vulnerability
Dangling pointer
Nov 2020: Scripting Engine Memory Corruption Vulnerability
CVE-2020-17052
7.5 - High
- November 11, 2020
Scripting Engine Memory Corruption Vulnerability
Nov 2020: Internet Explorer Memory Corruption Vulnerability
CVE-2020-17053
7.5 - High
- November 11, 2020
Internet Explorer Memory Corruption Vulnerability
Nov 2020: Microsoft Browser Memory Corruption Vulnerability
CVE-2020-17058
7.5 - High
- November 11, 2020
Microsoft Browser Memory Corruption Vulnerability
Sep 2020: Microsoft Browser Memory Corruption Vulnerability
CVE-2020-0878
4.2 - Medium
- September 11, 2020
<p>A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.</p> <p>An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers, and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically via an enticement in email or instant message, or by getting them to open an email attachment.</p> <p>The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.</p>
Memory Corruption
Sep 2020: WinINet API Elevation of Privilege Vulnerability
CVE-2020-1012
8.8 - High
- September 11, 2020
<p>An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.</p> <p>There are multiple ways an attacker could exploit the vulnerability:</p> <ul> <li><p>In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email.</p> </li> <li><p>In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit this vulnerability, and then convince a user to open the document file.</p> </li> </ul> <p>The security update addresses the vulnerability by ensuring the Wininit.dll properly handles objects in memory.</p>
Aug 2020: Scripting Engine Memory Corruption Vulnerability
CVE-2020-1380
7.8 - High
- August 17, 2020
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
Memory Corruption
Jun 2020:
CVE-2020-1260
- June 09, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1214, CVE-2020-1215, CVE-2020-1216, CVE-2020-1230.
Jun 2020:
CVE-2020-1213
- June 09, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1214, CVE-2020-1215, CVE-2020-1216, CVE-2020-1230, CVE-2020-1260.
Jun 2020:
CVE-2020-1214
- June 09, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1215, CVE-2020-1216, CVE-2020-1230, CVE-2020-1260.
Jun 2020:
CVE-2020-1215
- June 09, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1214, CVE-2020-1216, CVE-2020-1230, CVE-2020-1260.
Jun 2020:
CVE-2020-1216
- June 09, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1214, CVE-2020-1215, CVE-2020-1230, CVE-2020-1260.
Jun 2020:
CVE-2020-1219
- June 09, 2020
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'.
Jun 2020:
CVE-2020-1230
- June 09, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1213, CVE-2020-1214, CVE-2020-1215, CVE-2020-1216, CVE-2020-1260.
May 2020:
CVE-2020-1058
- May 21, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1035, CVE-2020-1060, CVE-2020-1093.
May 2020:
CVE-2020-1092
- May 21, 2020
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1062.
May 2020:
CVE-2020-1093
- May 21, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1035, CVE-2020-1058, CVE-2020-1060.
May 2020:
CVE-2020-1035
- May 21, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1058, CVE-2020-1060, CVE-2020-1093.
May 2020:
CVE-2020-1064
- May 21, 2020
A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input.An attacker could execute arbitrary code in the context of the current user, aka 'MSHTML Engine Remote Code Execution Vulnerability'.
May 2020:
CVE-2020-1062
- May 21, 2020
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-1092.
May 2020:
CVE-2020-1060
- May 21, 2020
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1035, CVE-2020-1058, CVE-2020-1093.
Apr 2020:
CVE-2020-0968
7.5 - High
- April 15, 2020
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0970.
Memory Corruption
Feb 2020:
CVE-2020-0674
7.5 - High
- February 11, 2020
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0673, CVE-2020-0710, CVE-2020-0711, CVE-2020-0712, CVE-2020-0713, CVE-2020-0767.
Dangling pointer
Nov 2019:
CVE-2019-1429
7.5 - High
- November 12, 2019
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1426, CVE-2019-1427, CVE-2019-1428.
Dangling pointer
Nov 2019:
CVE-2019-1390
- November 12, 2019
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'.
Oct 2019:
CVE-2019-1371
- October 10, 2019
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'.
Oct 2019:
CVE-2019-1357
- October 10, 2019
A spoofing vulnerability exists when Microsoft Browsers improperly handle browser cookies, aka 'Microsoft Browser Spoofing Vulnerability'. This CVE ID is unique from CVE-2019-0608.
Oct 2019:
CVE-2019-1239
- October 10, 2019
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1238.
Oct 2019:
CVE-2019-1238
- October 10, 2019
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1239.
Sep 2019:
CVE-2019-1367
7.5 - High
- September 23, 2019
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1221.
Memory Corruption
Sep 2019:
CVE-2019-1221
- September 11, 2019
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'.
Sep 2019:
CVE-2019-1236
- September 11, 2019
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1208.
Sep 2019:
CVE-2019-1220
- September 11, 2019
A security feature bypass vulnerability exists when Microsoft Browsers fail to validate the correct Security Zone of requests for specific URLs, aka 'Microsoft Browser Security Feature Bypass Vulnerability'.
Sep 2019:
CVE-2019-1208
- September 11, 2019
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1236.
Aug 2019: Scripting Engine Memory Corruption Vulnerability
CVE-2019-1133
7.5 - High
- August 14, 2019
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
Aug 2019: Microsoft Browsers Security Feature Bypass Vulnerability
CVE-2019-1192
4.3 - Medium
- August 14, 2019
A security feature bypass vulnerability exists when Microsoft browsers improperly handle requests of different origins. The vulnerability allows Microsoft browsers to bypass Same-Origin Policy (SOP) restrictions, and to allow requests that should otherwise be ignored. An attacker who successfully exploited the vulnerability could force the browser to send data that would otherwise be restricted. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers and then convince a user to view the website. The attacker could also take advantage of compromised websites, and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how affected Microsoft browsers handle different-origin requests.
Aug 2019: Scripting Engine Memory Corruption Vulnerability
CVE-2019-1194
7.5 - High
- August 14, 2019
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
Code Injection
Aug 2019: Microsoft Browser Memory Corruption Vulnerability
CVE-2019-1193
6.4 - Medium
- August 14, 2019
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, the attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft browsers, and then convince a user to view the website. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically via an enticement in email or instant message, or by getting them to open an email attachment. The security update addresses the vulnerability by modifying how Microsoft browsers handle objects in memory.
Memory Corruption
Jul 2019:
CVE-2019-1104
- July 15, 2019
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'.
Jul 2019:
CVE-2019-1059
- July 15, 2019
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1001, CVE-2019-1004, CVE-2019-1056.
Jul 2019:
CVE-2019-1001
- July 15, 2019
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1004, CVE-2019-1056, CVE-2019-1059.
Jul 2019:
CVE-2019-1004
- July 15, 2019
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1001, CVE-2019-1056, CVE-2019-1059.
Jul 2019:
CVE-2019-1056
- July 15, 2019
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1001, CVE-2019-1004, CVE-2019-1059.
Jun 2019: Scripting Engine Memory Corruption Vulnerability
CVE-2019-1005
7.5 - High
- June 12, 2019
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website designed to exploit the vulnerability through a Microsoft browser and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the browser rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Microsoft Internet Explorer (IE) or by Microsoft? Click the Watch button to subscribe.
