Internet Explorer 9

....appunto...i.e. è una mina vagante costante....anche se si tiene aggiornato, conviene non usarlo più...

Inviato dal mio GT-I9505 utilizzando Tapatalk
 
A casa ho Windows Vista e posso utilizzare solo Internet Explore 9 (dalla 10 in poi ci vuole Windows 7), avendo problemi di lentezza su alcune pagine e alcuni siti ogni tanto si blocca per qualche secondo, ho provato Google Chrome e non ho di questi problemi. Sugli stessi siti è più fluido e non si blocca. Per esempio ho problemi con Digital-Forum con IE9 e non li ho con Google Chrome.
 
..è consigliabile dimenticarsi di i.e. , sopratutto in vista della fine del supporto per windows xp per il prossimo 4 aprile...

Inviato dal mio GT-I9505 utilizzando Tapatalk
 
...eeehhh...la vedo dura per il mio pc...al massimo metto Ubuntu. ..

Inviato dal mio GT-I9505 utilizzando Tapatalk
 
Pur non ancora sapendo di tutte queste problematiche erano 5 anni che non lo usavo più figuriamoci da ora in poi ;)
 
Microsoft Internet Explorer Multiple Vulnerabilities



Where:From remote

Impact:System access

Solution Status:Vendor Patch

Description

Multiple vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's system.

1) An unspecified error can be exploited to corrupt memory.

2) Another unspecified error can be exploited to corrupt memory.

3) Another unspecified error can be exploited to corrupt memory.

4) Another unspecified error can be exploited to corrupt memory.

5) Another unspecified error can be exploited to corrupt memory.

6) Another unspecified error can be exploited to corrupt memory.

7) Another unspecified error can be exploited to corrupt memory.

8) Another unspecified error can be exploited to corrupt memory.

9) Another unspecified error can be exploited to corrupt memory.

10) Another unspecified error can be exploited to corrupt memory.

11) Another unspecified error can be exploited to corrupt memory.

12) Another unspecified error can be exploited to corrupt memory.

13) Another unspecified error can be exploited to corrupt memory.

14) Another unspecified error can be exploited to corrupt memory.

15) Another unspecified error can be exploited to corrupt memory.

16) Another unspecified error can be exploited to corrupt memory.

17) Another unspecified error can be exploited to corrupt memory.

18) Another unspecified error can be exploited to corrupt memory.

19) Another unspecified error can be exploited to corrupt memory.

20) Another unspecified error can be exploited to corrupt memory.

21) Another unspecified error can be exploited to corrupt memory.

22) Another unspecified error can be exploited to corrupt memory.

23) Another unspecified error can be exploited to corrupt memory.

24) Another unspecified error can be exploited to corrupt memory.

Successful exploitation allows execution of arbitrary code.

Solution:
Apply updates.
 
Microsoft Internet Explorer Multiple Vulnerabilities

Vulnerabilità:Altamente Critica

Where:From remote

Impact:Security Bypass, System access

Solution Status:Vendor Patch

Software:

Microsoft Internet Explorer 10.x
Microsoft Internet Explorer 11.x
Microsoft Internet Explorer 6.x
Microsoft Internet Explorer 7.x
Microsoft Internet Explorer 8.x
Microsoft Internet Explorer 9.x

Description

Multiple vulnerabilities have been reported in Microsoft Internet Explorer, which can be exploited by malicious people to bypass certain security restrictions and compromise a user's system.



1) An unspecified error can be exploited to corrupt memory.

2) An unspecified error can be exploited to bypass XSS filter.

3) An unspecified error can be exploited to corrupt memory.

4) Another unspecified error can be exploited to corrupt memory.

5) An unspecified error can be exploited to bypass XSS filter.

6) An unspecified error can be exploited to corrupt memory.

7) An unspecified error can be exploited to bypass ASLR.

8) An unspecified error can be exploited to corrupt memory.

9) Another unspecified error can be exploited to corrupt memory.

10) Another unspecified error can be exploited to corrupt memory.

11) Another unspecified error can be exploited to corrupt memory.

12) Another unspecified error can be exploited to corrupt memory.

13) Another unspecified error can be exploited to corrupt memory.

Successful exploitation of vulnerabilities #1, #3, #4, #6, and #8 through #13 allows execution of arbitrary code.

Solution:
Apply update.
 
Indietro
Alto Basso