Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2013 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-3186
The Protected Mode feature in Microsoft Internet Explorer 7 through 10 on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly implement the Integrity Access Level (aka IL) protection mechanism, whi...
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
NA
CVE-2013-3131
Microsoft .NET Framework 2.0 SP2, 3.5, 3.5.1, 4, and 4.5, and Silverlight 5 prior to 5.1.20513.0, does not properly prevent changes to data in multidimensional arrays of structures, which allows remote malicious users to execute arbitrary code via (1) a crafted .NET Framework app...
Microsoft .net Framework 2.0
Microsoft .net Framework 3.5
Microsoft Silverlight 5.0.60818.0
Microsoft Silverlight 5.1.10411.0
Microsoft .net Framework 3.5.1
Microsoft .net Framework 4.0
Microsoft Silverlight 5.1.20125.0
Microsoft .net Framework 4.5
Microsoft Silverlight 5.0.60401.0
Microsoft Silverlight 5.0.61118.0
NA
CVE-2013-3660
The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a poin...
Microsoft Windows Xp
Microsoft Windows Server 2003
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8 -
Microsoft Windows Server 2012 -
Microsoft Windows Vista
Microsoft Windows Server 2008
3 EDB exploits
3 Articles
NA
CVE-2013-1307
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability t...
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
NA
CVE-2013-1308
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerabil...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
NA
CVE-2013-1311
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Microsoft Internet Explorer 8
1 EDB exploit
NA
CVE-2013-1312
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
NA
CVE-2013-1297
Microsoft Internet Explorer 6 through 8 does not properly restrict data access by VBScript, which allows remote malicious users to perform cross-domain reading of JSON files via a crafted web site, aka "JSON Array Information Disclosure Vulnerability."
Microsoft Internet Explorer 8
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
1 Github repository
NA
CVE-2013-1302
Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote malicious users to execute arbitrary code via an invitation that triggers access to a deleted object, aka "Lync RCE Vulnerability...
Microsoft Lync Server 2013
Microsoft Office Communicator 2007
Microsoft Lync 2010
NA
CVE-2013-1306
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CV...
Microsoft Internet Explorer 9
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »