CVE-2013-1308
- EPSS 29.26%
- Published 15.05.2013 03:36:34
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a differ...
CVE-2013-1309
- EPSS 40.41%
- Published 15.05.2013 03:36:34
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a differ...
CVE-2013-1310
- EPSS 39.01%
- Published 15.05.2013 03:36:34
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
CVE-2013-1311
- EPSS 54.42%
- Published 15.05.2013 03:36:34
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
CVE-2013-1312
- EPSS 39.01%
- Published 15.05.2013 03:36:34
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
CVE-2013-0811
- EPSS 39.01%
- Published 15.05.2013 03:36:33
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different v...
CVE-2013-1297
- EPSS 21.89%
- Published 15.05.2013 03:36:33
- Last modified 11.04.2025 00:51:21
Microsoft Internet Explorer 6 through 8 does not properly restrict data access by VBScript, which allows remote attackers to perform cross-domain reading of JSON files via a crafted web site, aka "JSON Array Information Disclosure Vulnerability."
CVE-2013-1306
- EPSS 18.52%
- Published 15.05.2013 03:36:33
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnera...
CVE-2013-1307
- EPSS 39.01%
- Published 15.05.2013 03:36:33
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different v...
CVE-2013-1347
- EPSS 89.25%
- Published 05.05.2013 11:07:00
- Last modified 11.04.2025 00:51:21
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.