Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft jscript 5.8 vulnerabilities and exploits
(subscribe to this query)
7.6
CVSSv2
CVE-2016-0189
The Microsoft (1) JScript 5.8 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting En...
Microsoft Jscript 5.8
Microsoft Vbscript 5.8
Microsoft Vbscript 5.7
1 EDB exploit
4 Github repositories
3 Articles
4.3
CVSSv2
CVE-2015-6059
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote malicious users to obtain sensitive information from process memory via a crafted web site, aka "Scripting Engine Informatio...
Microsoft Jscript 5.8
Microsoft Jscript 5.6
Microsoft Jscript 5.7
Microsoft Vbscript 5.6
Microsoft Vbscript 5.7
Microsoft Vbscript 5.8
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
4.3
CVSSv2
CVE-2015-6052
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote malicious users to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript and JScript ASLR Bypass."
Microsoft Jscript 5.7
Microsoft Jscript 5.8
Microsoft Vbscript 5.8
Microsoft Vbscript 5.7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
9.3
CVSSv2
CVE-2012-2523
Integer overflow in Microsoft Internet Explorer 8 and 9, JScript 5.8, and VBScript 5.8 on 64-bit platforms allows remote malicious users to execute arbitrary code by leveraging an incorrect size calculation during object copying, aka "JavaScript Integer Overflow Remote Code ...
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Jscript 5.8
Microsoft Vbscript 5.8
4.3
CVSSv2
CVE-2015-1686
The Microsoft (1) VBScript 5.6 up to and including 5.8 and (2) JScript 5.6 up to and including 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote malicious users to bypass the ASLR protection mechanism via a crafted web site, aka "VBScrip...
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
Microsoft Internet Explorer 8
Microsoft Vbscript 5.8
Microsoft Vbscript 5.6
Microsoft Vbscript 5.7
9.3
CVSSv2
CVE-2009-1920
The JScript scripting engine 5.1, 5.6, 5.7, and 5.8 in JScript.dll in Microsoft Windows, as used in Internet Explorer, does not properly load decoded scripts into memory before execution, which allows remote malicious users to execute arbitrary code via a crafted web site that tr...
Microsoft Windows Xp -
Microsoft Windows Server 2008 -
Microsoft Windows Vista
Microsoft Windows Vista -
Microsoft Windows 2000 -
Microsoft Windows Xp
Microsoft Windows Server 2003
Microsoft Windows Server 2008
9.3
CVSSv2
CVE-2016-3204
The Microsoft (1) JScript 5.8 and 9 and (2) VBScript 5.7 and 5.8 engines, as used in Internet Explorer 9 through 11 and other products, allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Script...
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
4.3
CVSSv2
CVE-2011-0031
The (1) JScript 5.8 and (2) VBScript 5.8 scripting engines in Microsoft Windows Server 2008 R2 and Windows 7 do not properly load decoded scripts obtained from web pages, which allows remote malicious users to trigger memory corruption and consequently obtain sensitive informatio...
Microsoft Windows Server 2008 R2
Microsoft Windows 7 -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-52710
arbitrary
CVE-2024-5272
CVE-2024-2961
brute force
remote
CVE-2024-32944
CVE-2024-36241
CVE-2024-5274
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2