CVE-2013-0030
- EPSS 35.79%
- Published 13.02.2013 12:04:12
- Last modified 11.04.2025 00:51:21
The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
CVE-2013-0015
- EPSS 12.68%
- Published 13.02.2013 12:04:11
- Last modified 11.04.2025 00:51:21
Microsoft Internet Explorer 6 through 9 does not properly perform auto-selection of the Shift JIS encoding, which allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site that triggers cross-domain scroll...
CVE-2013-0018
- EPSS 45.69%
- Published 13.02.2013 12:04:11
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SetCapture Use After Free Vulnerability....
CVE-2013-0019
- EPSS 34.06%
- Published 13.02.2013 12:04:11
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerabi...
CVE-2013-0020
- EPSS 45.69%
- Published 13.02.2013 12:04:11
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkup Use After Free Vulnerability."
CVE-2013-0021
- EPSS 37.41%
- Published 13.02.2013 12:04:11
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."
CVE-2013-0022
- EPSS 31.01%
- Published 13.02.2013 12:04:11
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer LsGetTrailInfo Use After Free Vulnerability."
CVE-2013-0023
- EPSS 55.12%
- Published 13.02.2013 12:04:11
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
CVE-2013-0024
- EPSS 48.44%
- Published 13.02.2013 12:04:11
- Last modified 11.04.2025 00:51:21
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer pasteHTML Use After Free Vulnerability."
- EPSS 16.55%
- Published 29.01.2013 12:27:01
- Last modified 11.04.2025 00:51:21
Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not properly reuse TCP sessions to the proxy server, which allows remote attackers to obtain sensi...