Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 9 vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2015-2491
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2485 and CVE-2015-254...
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
828
VMScore
CVE-2015-2541
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2485 and CVE-2015-249...
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
676
VMScore
CVE-2016-0113
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-010...
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
828
VMScore
CVE-2015-1752
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-174...
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
383
VMScore
CVE-2015-1765
Microsoft Internet Explorer 9 through 11 allows remote malicious users to read the browser history via a crafted web site.
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
828
VMScore
CVE-2015-1767
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-240...
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
1 Article
231
VMScore
CVE-2016-7278
Microsoft Internet Explorer 9 through 11 allows remote malicious users to obtain sensitive information from process memory via a crafted web site, aka "Windows Hyperlink Object Library Information Disclosure Vulnerability."
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
828
VMScore
CVE-2014-4058
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
828
VMScore
CVE-2014-4099
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
387
VMScore
CVE-2016-3212
The XSS Filter in Microsoft Internet Explorer 9 through 11 does not properly identify JavaScript, which makes it easier for remote malicious users to conduct cross-site scripting (XSS) attacks via a crafted web site, aka "Internet Explorer XSS Filter Vulnerability."
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
15 Github repositories
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
denial of service
CVE-2024-27371
CVE-2024-20405
CVE-2024-31627
CVE-2024-31625
race condition
CVE-2024-4358
cross-site scripting
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »