Lucene search

K
MicrosoftInternet Explorer

1635 matches found

CVE
CVE
added 2010/01/22 10:0 p.m.138 views

CVE-2010-0248

Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnera...

9.3CVSS8.8AI score0.80239EPSS
CVE
CVE
added 2012/02/14 10:55 p.m.138 views

CVE-2012-0155

Microsoft Internet Explorer 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "VML Remote Code Execution Vulnerability."

9.3CVSS8AI score0.59749EPSS
CVE
CVE
added 2012/09/21 9:55 p.m.138 views

CVE-2012-2557

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "cloneNode Use After Free Vulnerability."

9.3CVSS7.4AI score0.36887EPSS
CVE
CVE
added 2013/10/09 2:53 p.m.138 views

CVE-2013-3885

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3882.

9.3CVSS7.6AI score0.23219EPSS
CVE
CVE
added 2020/08/17 7:15 p.m.138 views

CVE-2020-1570

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully explo...

7.6CVSS8AI score0.04153EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.137 views

CVE-2012-1880

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "insertRow Remote Code Execution Vulnerability."

9.3CVSS8AI score0.54934EPSS
CVE
CVE
added 2013/03/13 12:55 a.m.137 views

CVE-2013-0091

Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CElement Use After Free Vulnerability."

9.3CVSS7.4AI score0.36834EPSS
CVE
CVE
added 2013/11/13 12:55 a.m.137 views

CVE-2013-3912

Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3916.

9.3CVSS7.6AI score0.23856EPSS
CVE
CVE
added 2020/01/14 11:15 p.m.137 views

CVE-2020-0640

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'.

7.6CVSS8.7AI score0.03397EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.136 views

CVE-2012-1523

Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Center Element Remote Code Execution Vulnerability."

9.3CVSS8AI score0.54934EPSS
CVE
CVE
added 2012/08/15 1:55 a.m.136 views

CVE-2012-1526

Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not initialized or (2) is deleted, aka "Layout Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.53228EPSS
CVE
CVE
added 2013/06/12 3:30 a.m.136 views

CVE-2013-3120

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.

9.3CVSS7.6AI score0.32127EPSS
CVE
CVE
added 2020/03/12 4:15 p.m.136 views

CVE-2020-0768

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, ...

7.6CVSS7.7AI score0.28794EPSS
CVE
CVE
added 2013/06/12 3:29 a.m.135 views

CVE-2013-3111

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.

9.3CVSS7.6AI score0.38976EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.135 views

CVE-2013-3146

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.

9.3CVSS7.6AI score0.28635EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.135 views

CVE-2014-0279

Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0277 and CVE-2014-0278.

9.3CVSS7.6AI score0.39421EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.135 views

CVE-2014-0284

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.32615EPSS
CVE
CVE
added 2019/10/10 2:15 p.m.135 views

CVE-2019-0608

A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content, aka 'Microsoft Browser Spoofing Vulnerability'. This CVE ID is unique from CVE-2019-1357.

4.3CVSS6.3AI score0.0217EPSS
CVE
CVE
added 2020/11/11 7:15 a.m.135 views

CVE-2020-17052

Scripting Engine Memory Corruption Vulnerability

8.1CVSS8.4AI score0.05837EPSS
CVE
CVE
added 2010/10/13 7:0 p.m.134 views

CVE-2010-3328

Use-after-free vulnerability in the CAttrArray::PrivateFind function in mshtml.dll in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code by setting an unspecified property of a stylesheet object, aka "Uninitialized Memory Corruption Vulnerability."

9.3CVSS8.7AI score0.55394EPSS
CVE
CVE
added 2012/02/14 10:55 p.m.134 views

CVE-2012-0011

Microsoft Internet Explorer 7 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "HTML Layout Remote Code Execution Vulnerability."

9.3CVSS8AI score0.44833EPSS
CVE
CVE
added 2013/02/13 12:4 p.m.134 views

CVE-2013-0021

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."

9.3CVSS7.4AI score0.37408EPSS
CVE
CVE
added 2013/10/09 2:53 p.m.134 views

CVE-2013-3882

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885.

9.3CVSS7.6AI score0.23219EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.134 views

CVE-2014-0272

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.32615EPSS
CVE
CVE
added 2020/08/17 7:15 p.m.134 views

CVE-2020-1567

A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input.An attacker could execute arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnera...

7.6CVSS7.4AI score0.0161EPSS
CVE
CVE
added 2009/10/14 10:30 a.m.133 views

CVE-2009-2528

GDI+ in Microsoft Office XP SP3 does not properly handle malformed objects in Office Art Property Tables, which allows remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "Memory Corruption Vulnerability."

9.3CVSS7.2AI score0.43234EPSS
CVE
CVE
added 2013/05/15 3:36 a.m.133 views

CVE-2013-1310

Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."

9.3CVSS7.5AI score0.39006EPSS
CVE
CVE
added 2013/02/13 12:4 p.m.132 views

CVE-2013-0019

Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."

9.3CVSS7.4AI score0.22009EPSS
CVE
CVE
added 2013/06/12 3:30 a.m.132 views

CVE-2013-3124

Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3117 and CVE-2013-3122.

9.3CVSS7.6AI score0.32127EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.132 views

CVE-2013-3143

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3161.

9.3CVSS7.6AI score0.55484EPSS
CVE
CVE
added 2013/11/13 12:55 a.m.132 views

CVE-2013-3908

Microsoft Internet Explorer 6 through 10 allows user-assisted remote attackers to bypass the Same Origin Policy and obtain sensitive information from any visited document via a crafted web page that is not properly handled during a print-preview action, aka "Internet Explorer Information Disclosure...

4.3CVSS5.9AI score0.1497EPSS
CVE
CVE
added 2013/11/13 12:55 a.m.132 views

CVE-2013-3911

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.17841EPSS
CVE
CVE
added 2010/02/04 8:15 p.m.131 views

CVE-2010-0255

Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote attackers to bypass intended access restrictions and read arbitrary files via vectors involving JavaScript exploit code that constructs a reference to a...

4.3CVSS6.2AI score0.58108EPSS
CVE
CVE
added 2012/09/21 9:55 p.m.131 views

CVE-2012-1529

Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "OnMove Use After Free Vulnerability."

9.3CVSS7.5AI score0.26792EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.131 views

CVE-2012-1881

Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnRowsInserted Event Remote Code Execution Vulnerability."

9.3CVSS8.1AI score0.54934EPSS
CVE
CVE
added 2007/07/10 7:30 p.m.130 views

CVE-2007-3670

Argument injection vulnerability in Microsoft Internet Explorer, when running on systems with Firefox installed and certain URIs registered, allows remote attackers to conduct cross-browser scripting attacks and execute arbitrary commands via shell metacharacters in a (1) FirefoxURL or (2) FirefoxH...

4.3CVSS8.3AI score0.49726EPSS
CVE
CVE
added 2013/05/15 3:36 a.m.130 views

CVE-2013-1297

Microsoft Internet Explorer 6 through 8 does not properly restrict data access by VBScript, which allows remote attackers to perform cross-domain reading of JSON files via a crafted web site, aka "JSON Array Information Disclosure Vulnerability."

4.3CVSS6.3AI score0.34917EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.130 views

CVE-2013-3145

Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3150.

9.3CVSS7.6AI score0.15757EPSS
CVE
CVE
added 2013/08/14 11:10 a.m.130 views

CVE-2013-3193

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3187 and CVE-2013-3191.

9.3CVSS7.6AI score0.32127EPSS
CVE
CVE
added 2013/09/11 2:3 p.m.130 views

CVE-2013-3202

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.26539EPSS
CVE
CVE
added 2013/09/11 2:3 p.m.130 views

CVE-2013-3206

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3203, CVE-2013-3207, and CV...

9.3CVSS7.6AI score0.36569EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.130 views

CVE-2014-0289

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0267 and CVE-2014-0290.

9.3CVSS7.6AI score0.25169EPSS
CVE
CVE
added 2019/04/09 2:29 a.m.130 views

CVE-2019-0768

A security feature bypass vulnerability exists when Internet Explorer VBScript execution policy does not properly restrict VBScript under specific conditions, and to allow requests that should otherwise be ignored, aka 'Internet Explorer Security Feature Bypass Vulnerability'. This CVE ID is unique...

4.3CVSS5.6AI score0.88056EPSS
CVE
CVE
added 2012/08/15 1:55 a.m.129 views

CVE-2012-2521

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Asynchronous NULL Object Access Remote Code Execution Vulnerability."

9.3CVSS8.1AI score0.54934EPSS
CVE
CVE
added 2012/08/15 1:55 a.m.129 views

CVE-2012-2523

Integer overflow in Microsoft Internet Explorer 8 and 9, JScript 5.8, and VBScript 5.8 on 64-bit platforms allows remote attackers to execute arbitrary code by leveraging an incorrect size calculation during object copying, aka "JavaScript Integer Overflow Remote Code Execution Vulnerability."

9.3CVSS8.2AI score0.64663EPSS
CVE
CVE
added 2018/04/12 1:29 a.m.129 views

CVE-2018-0870

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 11. This CVE ID is unique from CVE-2018-0991, CVE-2018-0997, CVE-2018-1018, CVE-2018-1020.

7.6CVSS7.1AI score0.13005EPSS
CVE
CVE
added 2013/03/13 12:55 a.m.128 views

CVE-2013-0089

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."

9.3CVSS7.4AI score0.56572EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.128 views

CVE-2013-3152

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3146.

9.3CVSS7.6AI score0.28635EPSS
CVE
CVE
added 2013/09/11 2:3 p.m.128 views

CVE-2013-3203

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3201, CVE-2013-3206, CVE-2013-3207, and CV...

9.3CVSS7.6AI score0.36569EPSS
CVE
CVE
added 2012/04/10 9:55 p.m.127 views

CVE-2012-0170

Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnReadyStateChange Remote Code Execution Vulnerability."

9.3CVSS8.1AI score0.5845EPSS
Total number of security vulnerabilities1635