Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
internet explorer vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2020-9633
Adobe Flash Player Desktop Runtime 32.0.0.371 and previous versions, Adobe Flash Player for Google Chrome 32.0.0.371 and previous versions, and Adobe Flash Player for Microsoft Edge and Internet Explorer 32.0.0.330 and previous versions have an use after free vulnerability. Succe...
Adobe Flash Player Desktop Runtime
Adobe Flash Player
1 Article
10
CVSSv2
CVE-2019-9531
The web application portal of the Cobham EXPLORER 710, firmware version 1.07, allows unauthenticated access to port 5454. This could allow an unauthenticated, remote malicious user to connect to this port via Telnet and execute 86 Attention (AT) commands, including some that prov...
Cobham Explorer 710 Firmware 1.07
10
CVSSv2
CVE-2019-9533
The root password of the Cobham EXPLORER 710 is the same for all versions of firmware up to and including v1.08. This could allow an malicious user to reverse-engineer the password from available versions to gain authenticated access to the device.
Cobham Explorer 710 Firmware 1.07
10
CVSSv2
CVE-2014-4073
Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2 processes unverified data during interaction with the ClickOnce installer, which allows remote malicious users to gain privileges via vectors involving Internet Explorer, aka ".NET ClickOnce Elevation of ...
Microsoft .net Framework 2.0
Microsoft .net Framework 4.5.1
Microsoft .net Framework 4.5.2
Microsoft .net Framework 3.5
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.0
Microsoft .net Framework 4.5
10
CVSSv2
CVE-2014-1763
Use-after-free vulnerability in Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
10
CVSSv2
CVE-2014-1764
Microsoft Internet Explorer 7 through 11 allows remote malicious users to execute arbitrary code and bypass a sandbox protection mechanism by leveraging "object confusion" in a broker process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
1 EDB exploit
10
CVSSv2
CVE-2014-1776
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via vectors related to the CMarkup::IsConnectedToPrimaryMarkup function, as exploited in the wild in A...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
4 Articles
10
CVSSv2
CVE-2014-0506
Use-after-free vulnerability in Adobe Flash Player prior to 11.7.700.275 and 11.8.x up to and including 13.0.x prior to 13.0.0.182 on Windows and OS X and prior to 11.2.202.350 on Linux, Adobe AIR prior to 13.0.0.83 on Android, Adobe AIR SDK prior to 13.0.0.83, and Adobe AIR SDK ...
Adobe Flash Player 12.0.0.77
1 Article
10
CVSSv2
CVE-2013-0728
Multiple stack-based buffer overflows in NCSAddOn.dll in the ERDAS APOLLO ECWP plugin prior to 13.00.0001 for Internet Explorer, Firefox, and Chrome allow remote malicious users to execute arbitrary code via a long property value.
Hexagon Erdas Apollo Ecwp 13.00.0000
10
CVSSv2
CVE-2013-1489
Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 10 and Update 11, when running on Windows using Internet Explorer, Firefox, Opera, and Google Chrome, allows remote malicious users to bypass the "Very High" security le...
Oracle Jdk 1.7.0
Oracle Jre 1.7.0
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4040
privilege escalation
CVE-2024-4112
CVE-2024-32872
man-in-the-middle
CVE-2024-32788
bypass
CVE-2024-3400
CVE-2024-28976
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »