Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
internet_explorer vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-4969
Use-after-free vulnerability in the CMshtmlEd::Exec function in mshtml.dll in Microsoft Internet Explorer 6 through 9 allows remote malicious users to execute arbitrary code via a crafted web site, as exploited in the wild in September 2012.
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
1 EDB exploit
1 Article
NA
CVE-2013-0019
Use-after-free vulnerability in Microsoft Internet Explorer 7 through 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer COmWindowProxy Use After Free Vulnerability."
Microsoft Internet Explorer 8
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 7
1 EDB exploit
NA
CVE-2013-0029
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CHTML Use After Free Vulnerability."
Microsoft Internet Explorer 9
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 6
NA
CVE-2014-6363
vbscript.dll in Microsoft VBScript 5.6 up to and including 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memo...
Microsoft Vbscript 5.6
Microsoft Vbscript 5.7
Microsoft Vbscript 5.8
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
1 EDB exploit
NA
CVE-2008-1544
The setRequestHeader method of the XMLHttpRequest object in Microsoft Internet Explorer 5.01, 6, and 7 does not block dangerous HTTP request headers when certain 8-bit character sequences are appended to a header name, which allows remote malicious users to (1) conduct HTTP reque...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
NA
CVE-2011-0346
Use-after-free vulnerability in the ReleaseInterface function in MSHTML.DLL in Microsoft Internet Explorer 6, 7, and 8 allows remote malicious users to execute arbitrary code or cause a denial of service (application crash) via vectors related to the DOM implementation and the Br...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
NA
CVE-2007-2222
Multiple buffer overflows in the (1) ActiveListen (Xlisten.dll) and (2) ActiveVoice (Xvoice.dll) speech controls, as used by Microsoft Internet Explorer 5.01, 6, and 7, allow remote malicious users to execute arbitrary code via a crafted ActiveX object that triggers memory corrup...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7.0
2 EDB exploits
NA
CVE-2007-3027
Race condition in Microsoft Internet Explorer 5.01, 6, and 7 allows remote malicious users to execute arbitrary code by causing Internet Explorer to install multiple language packs in a way that triggers memory corruption, aka "Language Pack Installation Vulnerability."
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 7.0
NA
CVE-2008-4844
Use-after-free vulnerability in the CRecordInstance::TransferToDestination function in mshtml.dll in Microsoft Internet Explorer 5.01, 6, 6 SP1, and 7 allows remote malicious users to execute arbitrary code via DSO bindings involving (1) an XML Island, (2) XML DSOs, or (3) Tabula...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 7
3 EDB exploits
1 Github repository
NA
CVE-2010-2556
Microsoft Internet Explorer 6, 7, and 8 does not properly handle objects in memory, which allows remote malicious users to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, leading to memory corruption, aka "Uninitialized ...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
blind SQL injection
SSRF
buffer overflow
CVE-2023-28952
CVE-2023-41822
CVE-2024-27956
CVE-2023-7028
CVE-2024-34447
CVE-2024-34460
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »