Lucene search

K
MicrosoftInternet Explorer

732 matches found

CVE
CVE
added 2013/03/11 10:55 a.m.1149 views

CVE-2013-2551

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free...

9.3CVSS8.1AI score0.92743EPSS
CVE
CVE
added 2012/09/18 10:39 a.m.1072 views

CVE-2012-4969

Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.

9.3CVSS7.5AI score0.92755EPSS
CVE
CVE
added 2013/05/05 11:7 a.m.1072 views

CVE-2013-1347

Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.

9.3CVSS7.4AI score0.88409EPSS
CVE
CVE
added 2014/02/14 4:55 p.m.1036 views

CVE-2014-0322

Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.

9.3CVSS9.3AI score0.92573EPSS
CVE
CVE
added 2019/01/08 9:29 p.m.1035 views

CVE-2019-0541

A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka "MSHTML Engine Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Microsoft Excel Viewer, Interne...

9.3CVSS7.9AI score0.84144EPSS
CVE
CVE
added 2013/10/09 2:54 p.m.1026 views

CVE-2013-3897

Use-after-free vulnerability in the CDisplayPointer class in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript code that uses the onpropertychange event handler, as exploit...

9.3CVSS7.5AI score0.90892EPSS
CVE
CVE
added 2015/07/14 9:59 p.m.979 views

CVE-2015-2419

JScript 9 in Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "JScript9 Memory Corruption Vulnerability."

9.3CVSS8.7AI score0.88078EPSS
CVE
CVE
added 2015/07/14 9:59 p.m.976 views

CVE-2015-2425

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2383 and CVE-2015-2384.

9.3CVSS7.6AI score0.40446EPSS
CVE
CVE
added 2015/08/19 10:59 a.m.876 views

CVE-2015-2502

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as exploited in the wild in August 2015.

9.3CVSS7.6AI score0.178EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.578 views

CVE-2013-3163

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3151.

9.3CVSS7.6AI score0.88984EPSS
CVE
CVE
added 2013/09/18 10:8 a.m.332 views

CVE-2013-3893

Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.

9.3CVSS7.5AI score0.7126EPSS
CVE
CVE
added 2014/09/10 1:55 a.m.316 views

CVE-2014-4108

Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2799, CVE-2014-4059, CVE-2014-4065, CV...

9.3CVSS7.6AI score0.18139EPSS
CVE
CVE
added 2012/12/30 6:55 p.m.308 views

CVE-2012-4792

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wi...

9.3CVSS7.5AI score0.88915EPSS
CVE
CVE
added 2014/08/12 9:55 p.m.269 views

CVE-2014-2822

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-2810, CVE-2014-2811, CVE-2014-2823, and CVE-2014...

9.3CVSS7.7AI score0.1418EPSS
CVE
CVE
added 2008/12/11 3:30 p.m.260 views

CVE-2008-4844

Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabular Data Control (TDC) in a...

9.3CVSS7.5AI score0.82846EPSS
CVE
CVE
added 2013/05/15 3:36 a.m.256 views

CVE-2013-1308

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013...

9.3CVSS8.1AI score0.92743EPSS
CVE
CVE
added 2013/05/15 3:36 a.m.247 views

CVE-2013-1309

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013...

9.3CVSS8.1AI score0.92743EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.235 views

CVE-2013-3144

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3151 and CVE-2013-3163.

9.3CVSS7.6AI score0.88984EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.224 views

CVE-2013-3151

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3144 and CVE-2013-3163.

9.3CVSS7.6AI score0.88984EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.180 views

CVE-2012-1876

Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element Remote Code Execution Vulnera...

9.3CVSS8.1AI score0.8749EPSS
CVE
CVE
added 2015/07/14 9:59 p.m.165 views

CVE-2015-2384

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2383 and CVE-2015-2425.

9.3CVSS7.6AI score0.40446EPSS
CVE
CVE
added 2015/07/14 9:59 p.m.163 views

CVE-2015-2383

Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2384 and CVE-2015-2425.

9.3CVSS7.6AI score0.40446EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.160 views

CVE-2014-0288

Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0270, CVE-2014-0273, and CVE-2014-0274...

9.3CVSS7.6AI score0.32615EPSS
CVE
CVE
added 2010/03/10 10:30 p.m.158 views

CVE-2010-0806

Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, a...

9.3CVSS7.3AI score0.91165EPSS
CVE
CVE
added 2012/12/12 12:55 a.m.156 views

CVE-2012-4787

Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."

9.3CVSS7.4AI score0.36178EPSS
CVE
CVE
added 2012/09/21 9:55 p.m.151 views

CVE-2012-2546

Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Event Listener Use After Free Vulnerability."

9.3CVSS7.4AI score0.26792EPSS
CVE
CVE
added 2010/01/22 10:0 p.m.144 views

CVE-2010-0244

Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized Memory Corruption Vulne...

9.3CVSS8.7AI score0.42147EPSS
CVE
CVE
added 2007/05/08 11:19 p.m.143 views

CVE-2007-2221

Unspecified vulnerability in the mdsauth.dll COM object in Microsoft Windows Media Server in the Microsoft Internet Explorer 5.01 SP4 on Windows 2000 SP4; 6 SP1 on Windows 2000 SP4; 6 and 7 on Windows XP SP2, or Windows Server 2003 SP1 or SP2; or 7 on Windows Vista allows remote attackers to overwr...

9.3CVSS6.5AI score0.70118EPSS
CVE
CVE
added 2012/09/21 9:55 p.m.141 views

CVE-2012-2548

Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Layout Use After Free Vulnerability."

9.3CVSS7.4AI score0.36887EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.139 views

CVE-2012-1879

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by attempting to access an undefined memory location, aka "insertAdjacentText Remote Code Execution Vulnerability."

9.3CVSS8.1AI score0.29593EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.139 views

CVE-2014-0278

Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0277 and CVE-2014-0279.

9.3CVSS7.6AI score0.39421EPSS
CVE
CVE
added 2010/01/22 10:0 p.m.138 views

CVE-2010-0248

Microsoft Internet Explorer 6, 6 SP1, 7, and 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "HTML Object Memory Corruption Vulnera...

9.3CVSS8.8AI score0.80239EPSS
CVE
CVE
added 2012/02/14 10:55 p.m.138 views

CVE-2012-0155

Microsoft Internet Explorer 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "VML Remote Code Execution Vulnerability."

9.3CVSS8AI score0.59749EPSS
CVE
CVE
added 2012/09/21 9:55 p.m.138 views

CVE-2012-2557

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "cloneNode Use After Free Vulnerability."

9.3CVSS7.4AI score0.36887EPSS
CVE
CVE
added 2013/10/09 2:53 p.m.138 views

CVE-2013-3885

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3882.

9.3CVSS7.6AI score0.27054EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.137 views

CVE-2012-1880

Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "insertRow Remote Code Execution Vulnerability."

9.3CVSS8AI score0.54934EPSS
CVE
CVE
added 2013/03/13 12:55 a.m.137 views

CVE-2013-0091

Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CElement Use After Free Vulnerability."

9.3CVSS7.4AI score0.36834EPSS
CVE
CVE
added 2013/11/13 12:55 a.m.137 views

CVE-2013-3912

Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3916.

9.3CVSS7.6AI score0.23856EPSS
CVE
CVE
added 2012/06/12 10:55 p.m.136 views

CVE-2012-1523

Microsoft Internet Explorer 6 through 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "Center Element Remote Code Execution Vulnerability."

9.3CVSS8AI score0.54934EPSS
CVE
CVE
added 2012/08/15 1:55 a.m.136 views

CVE-2012-1526

Microsoft Internet Explorer 6 and 7 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not initialized or (2) is deleted, aka "Layout Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.53228EPSS
CVE
CVE
added 2013/06/12 3:30 a.m.136 views

CVE-2013-3120

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3118 and CVE-2013-3125.

9.3CVSS7.6AI score0.32127EPSS
CVE
CVE
added 2013/06/12 3:29 a.m.135 views

CVE-2013-3111

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3123.

9.3CVSS7.6AI score0.38976EPSS
CVE
CVE
added 2013/07/10 3:46 a.m.135 views

CVE-2013-3146

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3152.

9.3CVSS7.6AI score0.28635EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.135 views

CVE-2014-0279

Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0277 and CVE-2014-0278.

9.3CVSS7.6AI score0.39421EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.135 views

CVE-2014-0284

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.32615EPSS
CVE
CVE
added 2010/10/13 7:0 p.m.134 views

CVE-2010-3328

Use-after-free vulnerability in the CAttrArray::PrivateFind function in mshtml.dll in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code by setting an unspecified property of a stylesheet object, aka "Uninitialized Memory Corruption Vulnerability."

9.3CVSS8.7AI score0.55394EPSS
CVE
CVE
added 2012/02/14 10:55 p.m.134 views

CVE-2012-0011

Microsoft Internet Explorer 7 through 9 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing a deleted object, aka "HTML Layout Remote Code Execution Vulnerability."

9.3CVSS8AI score0.44833EPSS
CVE
CVE
added 2013/02/13 12:4 p.m.134 views

CVE-2013-0021

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."

9.3CVSS7.4AI score0.37408EPSS
CVE
CVE
added 2013/10/09 2:53 p.m.134 views

CVE-2013-3882

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3872, CVE-2013-3873, and CVE-2013-3885.

9.3CVSS7.6AI score0.27054EPSS
CVE
CVE
added 2014/02/12 4:50 a.m.134 views

CVE-2014-0272

Microsoft Internet Explorer 8 through 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."

9.3CVSS7.7AI score0.32615EPSS
Total number of security vulnerabilities732