Show filters
467 Total Results
Displaying 311-320 of 467
Sort by:
Attacker Value
Unknown

CVE-2013-0029

Disclosure Date: February 13, 2013 (last updated October 05, 2023)
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CHTML Use After Free Vulnerability."
0
Attacker Value
Unknown

CVE-2013-0024

Disclosure Date: February 13, 2013 (last updated December 08, 2023)
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer pasteHTML Use After Free Vulnerability."
0
Attacker Value
Unknown

CVE-2013-0030

Disclosure Date: February 13, 2013 (last updated October 05, 2023)
The Vector Markup Language (VML) implementation in Microsoft Internet Explorer 6 through 10 does not properly allocate buffers, which allows remote attackers to execute arbitrary code via a crafted web site, aka "VML Memory Corruption Vulnerability."
0
Attacker Value
Unknown

CVE-2013-0027

Disclosure Date: February 13, 2013 (last updated October 05, 2023)
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CPasteCommand Use After Free Vulnerability."
0
Attacker Value
Unknown

CVE-2013-1450

Disclosure Date: January 29, 2013 (last updated October 05, 2023)
Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not properly reuse TCP sessions to the proxy server, which allows remote attackers to obtain sensitive information intended for a specific host via a crafted HTML document that triggers many HTTPS requests and then triggers an HTTP request to that host, as demonstrated by reading a Cookie header, aka MSRC 12096gd.
0
Attacker Value
Unknown

CVE-2013-1451

Disclosure Date: January 29, 2013 (last updated October 05, 2023)
Microsoft Internet Explorer 8 and 9, when the Proxy Settings configuration has the same Proxy address and Port values in the HTTP and Secure rows, does not ensure that the SSL lock icon is consistent with the Address bar, which makes it easier for remote attackers to spoof web sites via a crafted HTML document that triggers many HTTPS requests to an arbitrary host, followed by an HTTPS request to a trusted host and then an HTTP request to an untrusted host, a related issue to CVE-2013-1450.
0
Attacker Value
Unknown

CVE-2012-6502

Disclosure Date: January 22, 2013 (last updated October 05, 2023)
Microsoft Internet Explorer before 10 allows remote attackers to obtain sensitive information about the existence of files, and read certain data from files, via a UNC share pathname in the SRC attribute of a SCRIPT element, as demonstrated by reading a name-value pair from a local file via a \\127.0.0.1\C$\ sequence.
0
Attacker Value
Unknown

CVE-2012-4792

Disclosure Date: December 30, 2012 (last updated August 15, 2024)
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
Attacker Value
Unknown

CVE-2012-4781

Disclosure Date: December 12, 2012 (last updated October 05, 2023)
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability."
0
Attacker Value
Unknown

CVE-2012-1529

Disclosure Date: September 21, 2012 (last updated October 05, 2023)
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "OnMove Use After Free Vulnerability."
0