Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2010-0027 β€” Code Injection in Microsoft Internet Explorer

CWE-94 β€” Code Injection4 documents4 sources
Severity
9.3CRITICALNVD
EPSS
50.1%
top 2.16%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 22
Latest updateMay 2

Description

The URL validation functionality in Microsoft Internet Explorer 5.01, 6, 6 SP1, 7 and 8, and the ShellExecute API function in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, does not properly process input parameters, which allows remote attackers to execute arbitrary local programs via a crafted URL, aka "URL Validation Vulnerability."

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages1 packages

β–ΆNVDmicrosoft/internet_explorer11 versions+10

πŸ”΄Vulnerability Details

1
GHSA
GHSA-gp2g-r8rq-q4j9: The URL validation functionality in Microsoft Internet Explorer 5β†—2022-05-02
β–Ά

πŸ’₯Exploits & PoCs

1
Exploit-DB
Microsoft Internet Explorer 8 - URI Validation Remote Code Execution↗2010-01-21
β–Ά

πŸ”Detection Rules

1
Suricata
ET WEB_CLIENT Possible Microsoft Internet Explorer URI Validation Remote Code Execution Attempt↗2010-07-30
β–Ά
CVE-2010-0027 β€” Code Injection in Microsoft | cvebase