Lucene search

K
MicrosoftInternet Explorer8

440 matches found

CVE
CVE
added 2013/03/11 10:55 a.m.1138 views

CVE-2013-2551

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free...

9.3CVSS8.1AI score0.92743EPSS
CVE
CVE
added 2013/05/05 11:7 a.m.1060 views

CVE-2013-1347

Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.

9.3CVSS7.4AI score0.88409EPSS
CVE
CVE
added 2012/09/18 10:39 a.m.1059 views

CVE-2012-4969

Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.

9.3CVSS7.5AI score0.92755EPSS
CVE
CVE
added 2013/10/09 2:54 p.m.1014 views

CVE-2013-3897

Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploit...

9.3CVSS7.5AI score0.90892EPSS
CVE
CVE
added 2014/04/27 10:55 a.m.982 views

CVE-2014-1776

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in April 2014. NOTE: this iss...

10CVSS9.4AI score0.76813EPSS
CVE
CVE
added 2014/02/26 2:55 p.m.928 views

CVE-2013-7331

The Microsoft.XMLDOM ActiveX control in Microsoft Windows 8.1 and earlier allows remote attackers to determine the existence of local pathnames, UNC share pathnames, intranet hostnames, and intranet IP addresses by examining error codes, as demonstrated by a res:// URL, and exploited in the wild in...

6.5CVSS6.3AI score0.85642EPSS
CVE
CVE
added 2014/10/15 10:55 a.m.877 views

CVE-2014-4123

Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability," as exploited in the wild in October 2014, a different vulnerability than CVE-2014-4124.

8.8CVSS6.7AI score0.28207EPSS
CVE
CVE
added 2015/08/19 10:59 a.m.876 views

CVE-2015-2502

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as exploited in the wild in August 2015.

9.3CVSS7.6AI score0.178EPSS
CVE
CVE
added 2014/08/12 9:55 p.m.854 views

CVE-2014-2817

Microsoft Internet Explorer 6 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability."

8.8CVSS7.5AI score0.19808EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.567 views

CVE-2013-3163

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.

9.3CVSS7.6AI score0.88984EPSS
CVE
CVE
added 2013/09/18 10:8 a.m.321 views

CVE-2013-3893

Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.

9.3CVSS7.5AI score0.7126EPSS
CVE
CVE
added 2014/09/10 1:55 a.m.316 views

CVE-2014-4108

Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CV...

9.3CVSS7.6AI score0.21715EPSS
CVE
CVE
added 2012/12/30 6:55 p.m.297 views

CVE-2012-4792

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wi...

9.3CVSS7.5AI score0.88915EPSS
CVE
CVE
added 2013/05/15 3:36 a.m.245 views

CVE-2013-1308

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013...

9.3CVSS8.1AI score0.92743EPSS
CVE
CVE
added 2013/05/15 3:36 a.m.236 views

CVE-2013-1309

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013...

9.3CVSS8.1AI score0.92743EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.224 views

CVE-2013-3144

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.

9.3CVSS7.6AI score0.88984EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.213 views

CVE-2013-3151

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.

9.3CVSS7.6AI score0.88984EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.180 views

CVE-2012-1876

Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnera...

9.3CVSS8.1AI score0.8749EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.162 views

CVE-2012-1858

The toStaticHTML API (aka the SafeHTML component) in Microsoft Internet Explorer 8 and 9, Communicator 2007 R2, and Lync 2010 and 2010 Attendee does not properly handle event attributes and script, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafte...

4.3CVSS5.2AI score0.67578EPSS
CVE
CVE
added 2010/01/22 10:0 p.m.144 views

CVE-2010-0244

Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulne...

9.3CVSS8.7AI score0.42147EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.139 views

CVE-2012-1879

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access an undefined memory location, aka "insertAdjacentText Remote Code Execution Vulnerability."

9.3CVSS8.1AI score0.29593EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.139 views

CVE-2014-0278

Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0277 and CVE-2014-0279.

9.3CVSS7.6AI score0.39421EPSS
CVE
CVE
added 2010/01/22 10:0 p.m.138 views

CVE-2010-0248

Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnera...

9.3CVSS8.8AI score0.80239EPSS
CVE
CVE
added 2012/09/21 9:55 p.m.138 views

CVE-2012-2557

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "cloneNode Use After Free Vulnerability."

9.3CVSS7.4AI score0.36887EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.137 views

CVE-2012-1880

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "insertRow Remote Code Execution Vulnerability."

9.3CVSS8AI score0.54934EPSS
CVE
CVE
added 2013/03/13 12:55 a.m.137 views

CVE-2013-0091

Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CElement Use After Free Vulnerability."

9.3CVSS7.4AI score0.36834EPSS
CVE
CVE
added 2013/11/13 12:55 a.m.137 views

CVE-2013-3912

Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3916.

9.3CVSS7.6AI score0.23856EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.136 views

CVE-2012-1523

Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Center Element Remote Code Execution Vulnerability."

9.3CVSS8AI score0.54934EPSS
CVE
CVE
added 2013/06/12 3:29 a.m.135 views

CVE-2013-3111

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.

9.3CVSS7.6AI score0.38976EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.135 views

CVE-2014-0279

Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0277 and CVE-2014-0278.

9.3CVSS7.6AI score0.39421EPSS
CVE
CVE
added 2010/10/13 7:0 p.m.134 views

CVE-2010-3328

Use-after-free vulnerability in the CAttrArray::PrivateFind function in mshtml.dll in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code by setting an unspecified property of a stylesheet object, aka "Uninitialized Memory Corruption Vulnerability."

9.3CVSS8.7AI score0.55394EPSS
CVE
CVE
added 2012/02/14 10:55 p.m.134 views

CVE-2012-0011

Microsoft Internet Explorer 7 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "HTML Layout Remote Code Execution Vulnerability."

9.3CVSS8AI score0.44833EPSS
CVE
CVE
added 2013/02/13 12:4 p.m.134 views

CVE-2013-0021

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."

9.3CVSS7.4AI score0.37408EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.134 views

CVE-2014-0272

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.32615EPSS
CVE
CVE
added 2013/02/13 12:4 p.m.132 views

CVE-2013-0019

Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."

9.3CVSS7.4AI score0.22009EPSS
CVE
CVE
added 2013/11/13 12:55 a.m.132 views

CVE-2013-3908

Microsoft Internet Explorer 6 through 10 allows user-assisted remote attackers to bypass the Same Origin Policy and obtain sensitive information from any visited document via a crafted web page that is not properly handled during a print-preview action, aka "Internet Explorer Information Disclosure...

4.3CVSS5.9AI score0.1497EPSS
CVE
CVE
added 2010/02/04 8:15 p.m.131 views

CVE-2010-0255

Microsoft Internet Explorer 5.01 SP4, 6, 6 SP1, 7, and 8 does not prevent rendering of non-HTML local files as HTML documents, which allows remote attackers to bypass intended access restrictions and read arbitrary files via vectors involving JavaScript exploit code that constructs a reference to a...

4.3CVSS6.2AI score0.58108EPSS
CVE
CVE
added 2012/09/21 9:55 p.m.131 views

CVE-2012-1529

Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "OnMove Use After Free Vulnerability."

9.3CVSS7.5AI score0.26792EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.131 views

CVE-2012-1881

Microsoft Internet Explorer 8 and 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "OnRowsInserted Event Remote Code Execution Vulnerability."

9.3CVSS8.1AI score0.54934EPSS
CVE
CVE
added 2013/05/15 3:36 a.m.130 views

CVE-2013-1297

Microsoft Internet Explorer 6 through 8 does not properly restrict data access by VBScript, which allows remote attackers to perform cross-domain reading of JSON files via a crafted web site, aka "JSON Array Information Disclosure Vulnerability."

4.3CVSS6.3AI score0.34917EPSS
CVE
CVE
added 2012/08/15 1:55 a.m.129 views

CVE-2012-2521

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Asynchronous NULL Object Access Remote Code Execution Vulnerability."

9.3CVSS8.1AI score0.54934EPSS
CVE
CVE
added 2012/08/15 1:55 a.m.129 views

CVE-2012-2523

Integer overflow in Microsoft Internet Explorer 8 and 9, JScript 5.8, and VBScript 5.8 on 64-bit platforms allows remote attackers to execute arbitrary code by leveraging an incorrect size calculation during object copying, aka "JavaScript Integer Overflow Remote Code Execution Vulnerability."

9.3CVSS8.2AI score0.64663EPSS
CVE
CVE
added 2013/03/13 12:55 a.m.128 views

CVE-2013-0089

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkupBehaviorContext Use After Free Vulnerability."

9.3CVSS7.4AI score0.56572EPSS
CVE
CVE
added 2013/11/13 12:55 a.m.127 views

CVE-2013-3916

Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3912.

9.3CVSS7.6AI score0.23856EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.126 views

CVE-2012-1877

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Title Element Change Remote Code Execution Vulnerability."

9.3CVSS8.1AI score0.54934EPSS
CVE
CVE
added 2013/11/13 12:55 a.m.126 views

CVE-2013-3917

Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3915.

9.3CVSS7.6AI score0.30587EPSS
CVE
CVE
added 2013/12/11 12:55 a.m.126 views

CVE-2013-5048

Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-5047.

9.3CVSS7.6AI score0.22762EPSS
CVE
CVE
added 2013/03/13 12:55 a.m.125 views

CVE-2013-0088

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer saveHistory Use After Free Vulnerability."

9.3CVSS7.4AI score0.36834EPSS
CVE
CVE
added 2013/03/13 12:55 a.m.125 views

CVE-2013-0092

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer GetMarkupPtr Use After Free Vulnerability."

9.3CVSS7.4AI score0.32903EPSS
CVE
CVE
added 2013/06/12 3:29 a.m.125 views

CVE-2013-3116

Microsoft Internet Explorer 7 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.26539EPSS
Total number of security vulnerabilities440