Microsoft

Internet Explorer

1637 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 9.63%
  • Published 29.01.2013 12:27:01
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not ensure that the SSL lock icon is consistent with the Address bar, which makes it easier for re...

  • EPSS 6.5%
  • Published 22.01.2013 15:55:02
  • Last modified 11.04.2025 00:51:21

Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by readin...

Warning
  • EPSS 91.48%
  • Published 30.12.2012 18:55:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated ...

  • EPSS 49.42%
  • Published 12.12.2012 00:55:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."

  • EPSS 47.93%
  • Published 12.12.2012 00:55:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability."

  • EPSS 36.18%
  • Published 12.12.2012 00:55:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref...

  • EPSS 14.22%
  • Published 14.11.2012 00:55:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site, aka "CFormElement Use After Free Vulnerability."

  • EPSS 14.9%
  • Published 14.11.2012 00:55:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site, aka "CTreePos Use After Free Vulnerability."

  • EPSS 14.81%
  • Published 14.11.2012 00:55:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site, aka "CTreeNode Use After Free Vulnerability."

  • EPSS 26.79%
  • Published 21.09.2012 21:55:01
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "OnMove Use Af...