Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 8 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2014-1764
Microsoft Internet Explorer 7 through 11 allows remote malicious users to execute arbitrary code and bypass a sandbox protection mechanism by leveraging "object confusion" in a broker process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
1 EDB exploit
978
VMScore
CVE-2014-6332
OleAut32.dll in OLE in Microsoft Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote malicious users to execute arbitrary code via a craft...
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
Microsoft Windows Server 2008 -
Microsoft Windows Vista -
Microsoft Windows Rt -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 8.1 -
Microsoft Windows Server 2003 -
Microsoft Windows Server 2012 R2
Microsoft Windows 8 -
9 EDB exploits
10 Github repositories
9 Articles
956
VMScore
CVE-2012-1876
Microsoft Internet Explorer 6 through 9, and 10 Consumer Preview, does not properly handle objects in memory, which allows remote malicious users to execute arbitrary code by attempting to access a nonexistent object, leading to a heap-based buffer overflow, aka "Col Element...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
5 EDB exploits
3 Github repositories
1 Article
945
VMScore
CVE-2010-3971
Use-after-free vulnerability in the CSharedStyleSheet::Notify function in the Cascading Style Sheets (CSS) parser in mshtml.dll, as used in Microsoft Internet Explorer 6 through 8 and other products, allows remote malicious users to execute arbitrary code or cause a denial of ser...
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
3 EDB exploits
1 Github repository
945
VMScore
CVE-2010-3962
Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote malicious users to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uni...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
3 EDB exploits
1 Article
945
VMScore
CVE-2008-4844
Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote malicious users to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabula...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 7
3 EDB exploits
1 Github repository
945
VMScore
CVE-2007-0018
Stack-based buffer overflow in the NCTAudioFile2.AudioFile ActiveX control (NCTAudioFile2.dll), as used by multiple products, allows remote malicious users to execute arbitrary code via a long argument to the SetFormatLikeSample function. NOTE: the products include (1) NCTsoft NC...
Altdo Mp3 Record And Edit Audio Master 1.2
Americanshareware Mp3 Wav Converter 3.1.8
Code-it Softare Wave Mp3 Editor 10.1
Dandans Digital Media Products Easy Audio Editor 7.4
Dandans Digital Media Products Full Audio Converter 4.2
Iaudiosoft.com Absolute Sound Recorder 3.4.5
Iaudiosoft.com Absolute Video To Audio Converter 2.7.9
J Hepple Products Fx Movie Joiner And Splitter 6.2.8
J Hepple Products Fx Movie Splitter 6.4.7
Mcfunsoft Audio Editor 6.3.3 Build 489
Mcfunsoft Audio Recorder For Free 6.1
Movavi Convertmovie 4.4
Cdburnerxp Cdburnerxp Pro 3.0.116
Cheetahburner Cheetah Cd Burner 3.56
Digital Borneo Audio Mixer And Editor 1.1.0
Easy Ringtone Maker Easy Ringtone Maker 2.0.5
J Hepple Products Fx Audio Editor 4.7.11
J Hepple Products Fx Audio Tools 7.3.4
Joshua Mediasoft Audio Convertor Plus 2.2
Joshua Mediasoft Video Converter Plus 3.01
Mcfunsoft Ipod Music Converter 5.1
Mcfunsoft Recording To Ipod Solution 5.1
3 EDB exploits
941
VMScore
CVE-2014-0282
Microsoft Internet Explorer 6 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-177...
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
Microsoft Internet Explorer 11
Microsoft Internet Explorer 8
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
2 EDB exploits
4 Github repositories
941
VMScore
CVE-2010-0249
Use-after-free vulnerability in Microsoft Internet Explorer 6, 6 SP1, 7, and 8 on Windows 2000 SP4; Windows XP SP2 and SP3; Windows Server 2003 SP2; Windows Vista Gold, SP1, and SP2; Windows Server 2008 Gold, SP2, and R2; and Windows 7 allows remote malicious users to execute arb...
Microsoft Internet Explorer 5.0.1
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7.0
Microsoft Internet Explorer 8
2 EDB exploits
2 Github repositories
6 Articles
940
VMScore
CVE-2013-0025
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SLayoutRun Use After Free Vulnerability."
Microsoft Internet Explorer 8
2 EDB exploits
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »