Microsoft

Internet Explorer

1637 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 35.79%
  • Veröffentlicht 13.02.2013 12:04:12
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."

  • EPSS 12.68%
  • Veröffentlicht 13.02.2013 12:04:11
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Microsoft Internet Explorer 6 through 9 does not properly perform auto-selection of the Shift JIS encoding, which allows remote attackers to read content from a different (1) domain or (2) zone via a crafted web site that triggers cross-domain scroll...

  • EPSS 45.69%
  • Veröffentlicht 13.02.2013 12:04:11
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SetCapture Use After Free Vulnerability....

  • EPSS 34.06%
  • Veröffentlicht 13.02.2013 12:04:11
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerabi...

  • EPSS 45.69%
  • Veröffentlicht 13.02.2013 12:04:11
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkup Use After Free Vulnerability."

  • EPSS 37.41%
  • Veröffentlicht 13.02.2013 12:04:11
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer vtable Use After Free Vulnerability."

  • EPSS 31.01%
  • Veröffentlicht 13.02.2013 12:04:11
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer LsGetTrailInfo Use After Free Vulnerability."

  • EPSS 55.12%
  • Veröffentlicht 13.02.2013 12:04:11
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."

  • EPSS 48.44%
  • Veröffentlicht 13.02.2013 12:04:11
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer pasteHTML Use After Free Vulnerability."

Exploit
  • EPSS 16.55%
  • Veröffentlicht 29.01.2013 12:27:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not properly reuse TCP sessions to the proxy server, which allows remote attackers to obtain sensi...