Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2013 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2013-0020
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CMarkup Use After Free Vulnerability."
Microsoft Internet Explorer 9
9.3
CVSSv2
CVE-2013-0022
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer LsGetTrailInfo Use After Free Vulnerability."
Microsoft Internet Explorer 9
9.3
CVSSv2
CVE-2013-0026
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer InsertElement Use After Free Vulnerability."
Microsoft Internet Explorer 9
9.3
CVSSv2
CVE-2013-0091
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CElement Use After Free Vulnerability."
Microsoft Internet Explorer 8
9.3
CVSSv2
CVE-2013-1288
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CTreeNode Use After Free Vulnerability."
Microsoft Internet Explorer 8
7.5
CVSSv2
CVE-2013-2552
Unspecified vulnerability in Microsoft Internet Explorer 10 on Windows 8 allows remote malicious users to bypass the sandbox protection mechanism by leveraging access to a Medium integrity process, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013.
Microsoft Internet Explorer 10
9.3
CVSSv2
CVE-2013-1311
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Microsoft Internet Explorer 8
1 EDB exploit
9.3
CVSSv2
CVE-2013-3140
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted CMarkup object, aka "Internet Explorer Use After Free Vulnerability."
Microsoft Internet Explorer 9
9.3
CVSSv2
CVE-2013-0025
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SLayoutRun Use After Free Vulnerability."
Microsoft Internet Explorer 8
2 EDB exploits
9.3
CVSSv2
CVE-2013-1306
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CV...
Microsoft Internet Explorer 9
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »