Lucene search

K
MicrosoftInternet Explorer

1635 matches found

CVE
CVE
added 2015/02/11 3:0 a.m.50 views

CVE-2015-0044

Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-8967 and CVE-2015-0050.

9.3CVSS7.7AI score0.51421EPSS
CVE
CVE
added 2015/02/11 3:1 a.m.50 views

CVE-2015-0068

Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0027, CVE-2015-0035, CVE-2015-0039, and C...

9.3CVSS7.6AI score0.2961EPSS
CVE
CVE
added 2015/05/13 10:59 a.m.50 views

CVE-2015-1658

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1706, CVE-2015-1711, CVE-2015-1717, and CVE-2015...

9.3CVSS7.6AI score0.22819EPSS
CVE
CVE
added 2015/04/14 8:59 p.m.50 views

CVE-2015-1660

Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.29545EPSS
CVE
CVE
added 2015/04/14 8:59 p.m.50 views

CVE-2015-1667

Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.29545EPSS
CVE
CVE
added 2015/07/14 9:59 p.m.50 views

CVE-2015-2403

Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.28139EPSS
CVE
CVE
added 2015/07/14 9:59 p.m.50 views

CVE-2015-2410

Microsoft Internet Explorer 6 through 11 allows remote attackers to determine the existence of local files via a crafted stylesheet, aka "Internet Explorer Information Disclosure Vulnerability."

4.3CVSS6.1AI score0.31367EPSS
CVE
CVE
added 2015/11/11 11:59 a.m.50 views

CVE-2015-6068

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6072, CVE-2015-6073, CVE-2015-6075, CVE-2015-607...

9.3CVSS7.5AI score0.28139EPSS
CVE
CVE
added 2015/12/09 11:59 a.m.50 views

CVE-2015-6164

Microsoft Internet Explorer 9 through 11 improperly implements a cross-site scripting (XSS) protection mechanism, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, aka "Internet Explorer XSS Filter Bypass Vulnerability."

6.8CVSS5.1AI score0.28175EPSS
CVE
CVE
added 2016/07/13 1:59 a.m.50 views

CVE-2016-3243

Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

7.6CVSS8.2AI score0.16929EPSS
CVE
CVE
added 2016/10/14 2:59 a.m.50 views

CVE-2016-3388

Microsoft Internet Explorer 10 and 11 and Microsoft Edge do not properly restrict access to private namespaces, which allows remote attackers to gain privileges via unspecified vectors, aka "Microsoft Browser Elevation of Privilege Vulnerability," a different vulnerability than CVE-2016-3387.

5.3CVSS6.2AI score0.47517EPSS
CVE
CVE
added 2000/01/04 5:0 a.m.49 views

CVE-1999-0891

The "download behavior" in Internet Explorer 5 allows remote attackers to read arbitrary files via a server-side redirect.

5CVSS6.7AI score0.601EPSS
CVE
CVE
added 2001/09/12 4:0 a.m.49 views

CVE-1999-1016

Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a tab...

5CVSS7.4AI score0.08651EPSS
CVE
CVE
added 2002/03/09 5:0 a.m.49 views

CVE-1999-1087

Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that conta...

7.5CVSS7AI score0.10203EPSS
CVE
CVE
added 2000/06/02 4:0 a.m.49 views

CVE-2000-0329

A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.

5.1CVSS7AI score0.08048EPSS
CVE
CVE
added 2003/05/12 4:0 a.m.49 views

CVE-2003-0116

Microsoft Internet Explorer 5.01, 5.5 and 6.0 does not properly check the Cascading Style Sheet input parameter for Modal dialogs, which allows remote attackers to read files on the local system via a web page containing script that creates a dialog and then accesses the target files, aka "Modal Di...

5CVSS7.4AI score0.25468EPSS
CVE
CVE
added 2004/11/23 5:0 a.m.49 views

CVE-2004-0284

Microsoft Internet Explorer 6.0, Outlook 2002, and Outlook 2003 allow remote attackers to cause a denial of service (CPU consumption), if "Do not save encrypted pages to disk" is disabled, via a web site or HTML e-mail that contains two null characters (%00) after the host name.

5CVSS6.7AI score0.1127EPSS
CVE
CVE
added 2004/09/14 4:0 a.m.49 views

CVE-2004-0839

Internet Explorer in Windows XP SP2, and other versions including 5.01 and 5.5, allows remote attackers to install arbitrary programs via a web page that uses certain styles and the AnchorClick behavior, popup windows, and drag-and-drop capabilities to drop the program in the local startup folder, ...

5CVSS7.4AI score0.38826EPSS
CVE
CVE
added 2005/08/04 4:0 a.m.49 views

CVE-2004-2291

Microsoft Windows Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code via an embedded script that uses Shell Helper objects and a shortcut (link) to execute the target script.

7.5CVSS8AI score0.20061EPSS
CVE
CVE
added 2005/05/02 4:0 a.m.49 views

CVE-2005-0055

Internet Explorer 5.01, 5.5, and 6 does not properly validate buffers when handling certain DHTML methods including the createControlRange Javascript function, which allows remote attackers to execute arbitrary code, aka the "DHTML Method Heap Memory Corruption Vulnerability."

7.5CVSS7.5AI score0.4487EPSS
CVE
CVE
added 2005/06/15 4:0 a.m.49 views

CVE-2005-1211

Buffer overflow in the PNG image rendering component of Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted PNG file.

5.1CVSS7.6AI score0.4344EPSS
CVE
CVE
added 2006/04/05 10:4 a.m.49 views

CVE-2006-1626

Internet Explorer 6 for Windows XP SP2 and earlier allows remote attackers to spoof the address bar and possibly conduct phishing attacks by re-opening the window to a malicious Shockwave Flash application, then changing the window location back to a trusted URL while the Flash application is still...

4.3CVSS6.5AI score0.53049EPSS
CVE
CVE
added 2006/07/06 1:5 a.m.49 views

CVE-2006-3354

Microsoft Internet Explorer 6 allows remote attackers to cause a denial of service (crash) by setting the Filter property of an ADODB.Recordset ActiveX object to certain values multiple times, which triggers a null dereference.

5CVSS7AI score0.41065EPSS
CVE
CVE
added 2006/08/17 1:4 a.m.49 views

CVE-2006-4193

Microsoft Internet Explorer 6.0 SP1 and possibly other versions allows remote attackers to cause a denial of service and possibly execute arbitrary code by instantiating COM objects as ActiveX controls, including (1) imskdic.dll (Microsoft IME), (2) chtskdic.dll (Microsoft IME), and (3) msoe.dll (O...

7.5CVSS7.7AI score0.50185EPSS
CVE
CVE
added 2007/03/02 9:18 p.m.49 views

CVE-2006-7065

Microsoft Internet Explorer allows remote attackers to cause a denial of service (crash) via an IFRAME with a certain XML file and XSL stylesheet that triggers a crash in mshtml.dll when a refresh is called, probably a null pointer dereference.

5CVSS7AI score0.17741EPSS
CVE
CVE
added 2007/01/31 11:28 a.m.49 views

CVE-2007-0612

Multiple ActiveX controls in Microsoft Windows 2000, XP, 2003, and Vista allows remote attackers to cause a denial of service (Internet Explorer crash) by accessing the bgColor, fgColor, linkColor, alinkColor, vlinkColor, or defaultCharset properties in the (1) giffile, (2) htmlfile, (3) jpegfile, ...

7.8CVSS6.7AI score0.53487EPSS
CVE
CVE
added 2007/05/08 11:19 p.m.49 views

CVE-2007-0942

Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4; 6 SP1 on Windows 2000 SP4; 6 and 7 on Windows XP SP2, or Windows Server 2003 SP1 or SP2; and possibly 7 on Windows Vista does not properly "instantiate certain COM objects as ActiveX controls," which allows remote attackers to execute arbitr...

9.3CVSS7.5AI score0.54907EPSS
CVE
CVE
added 2007/08/14 9:17 p.m.49 views

CVE-2007-0943

Unspecified vulnerability in Internet Explorer 5.01 and 6 SP1 allows remote attackers to execute arbitrary code via crafted Cascading Style Sheets (CSS) strings that trigger memory corruption during parsing, related to use of out-of-bounds pointers.

6.8CVSS7.5AI score0.62193EPSS
CVE
CVE
added 2007/08/14 9:17 p.m.49 views

CVE-2007-3041

Unspecified vulnerability in the pdwizard.ocx ActiveX object for Internet Explorer 5.01, 6 SP1, and 7 allows remote attackers to execute arbitrary code via unknown vectors related to Microsoft Visual Basic 6 objects and memory corruption, aka "ActiveX Object Memory Corruption Vulnerability."

9.3CVSS7.4AI score0.55842EPSS
CVE
CVE
added 2008/02/12 11:0 p.m.49 views

CVE-2008-0077

Use-after-free vulnerability in Microsoft Internet Explorer 6 SP1, 6 SP2, and and 7 allows remote attackers to execute arbitrary code by assigning malformed values to certain properties, as demonstrated using the by property of an animateMotion SVG element, aka "Property Memory Corruption Vulnerabi...

9.3CVSS8.9AI score0.65009EPSS
CVE
CVE
added 2008/12/10 2:0 p.m.49 views

CVE-2008-4258

Microsoft Internet Explorer 5.01 SP4 and 6 SP1 does not properly validate parameters during calls to navigation methods, which allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Parameter Validation Memory Corruption Vulnerability."

8.5CVSS7.2AI score0.54688EPSS
CVE
CVE
added 2010/08/11 6:47 p.m.49 views

CVE-2010-2556

Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulnerabilit...

9.3CVSS7.5AI score0.57546EPSS
CVE
CVE
added 2010/12/16 7:33 p.m.49 views

CVE-2010-3345

Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Element Memory Corruption Vulnerability."

9.3CVSS7.6AI score0.62798EPSS
CVE
CVE
added 2011/10/12 2:52 a.m.49 views

CVE-2011-1993

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Scroll Event Remote Code Execution Vulnerability."

9.3CVSS8.1AI score0.37675EPSS
CVE
CVE
added 2011/10/12 2:52 a.m.49 views

CVE-2011-2001

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an attempted access to a virtual function table after corruption of this table has occurred, aka "Virtual Function Table Corruption Remote Code Execution V...

9.3CVSS8.1AI score0.47995EPSS
CVE
CVE
added 2013/02/13 12:4 p.m.49 views

CVE-2013-0020

Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkup Use After Free Vulnerability."

9.3CVSS7.4AI score0.4569EPSS
CVE
CVE
added 2013/02/13 12:4 p.m.49 views

CVE-2013-0026

Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer InsertElement Use After Free Vulnerability."

9.3CVSS7.4AI score0.4569EPSS
CVE
CVE
added 2013/02/13 12:4 p.m.49 views

CVE-2013-0029

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CHTML Use After Free Vulnerability."

9.3CVSS7.4AI score0.51589EPSS
CVE
CVE
added 2013/05/15 3:36 a.m.49 views

CVE-2013-1307

Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-0811.

9.3CVSS7.4AI score0.39006EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.49 views

CVE-2014-0268

Microsoft Internet Explorer 8 through 11 does not properly restrict file installation and registry-key creation, which allows remote attackers to bypass the Mandatory Integrity Control protection mechanism via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."

4.3CVSS6.7AI score0.08125EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.49 views

CVE-2014-0283

Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.32615EPSS
CVE
CVE
added 2014/07/08 10:55 p.m.49 views

CVE-2014-2788

Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2794.

9.3CVSS7.7AI score0.1631EPSS
CVE
CVE
added 2014/07/08 10:55 p.m.49 views

CVE-2014-2792

Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2786 and CVE-2014-2813.

9.3CVSS7.6AI score0.18345EPSS
CVE
CVE
added 2014/07/08 10:55 p.m.49 views

CVE-2014-2798

Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2789, CVE-2014-2795, and CVE-2014-2804...

9.3CVSS7.6AI score0.16987EPSS
CVE
CVE
added 2014/08/12 9:55 p.m.49 views

CVE-2014-4056

Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.8AI score0.18901EPSS
CVE
CVE
added 2014/09/10 1:55 a.m.49 views

CVE-2014-4084

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4093.

9.3CVSS7.7AI score0.16987EPSS
CVE
CVE
added 2014/09/10 1:55 a.m.49 views

CVE-2014-4102

Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-4080, CVE-2014-4089, and CVE-2014-4091.

9.3CVSS7.6AI score0.21715EPSS
CVE
CVE
added 2014/11/11 10:55 p.m.49 views

CVE-2014-6323

Microsoft Internet Explorer 7 through 11 allows remote attackers to obtain sensitive clipboard information via a crafted web site, aka "Internet Explorer Clipboard Information Disclosure Vulnerability."

4.3CVSS5.8AI score0.41442EPSS
CVE
CVE
added 2015/02/11 3:0 a.m.49 views

CVE-2015-0018

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0037, CVE-2015-0040, and CVE-2015-0066.

9.3CVSS7.6AI score0.49669EPSS
CVE
CVE
added 2015/02/11 3:0 a.m.49 views

CVE-2015-0048

Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0028.

9.3CVSS7.6AI score0.24067EPSS
Total number of security vulnerabilities1635