Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2013 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-1338
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerabil...
Microsoft Internet Explorer 6
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
NA
CVE-2013-3660
The EPATHOBJ::pprFlattenRec function in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, and Windows Server 2012 does not properly initialize a poin...
Microsoft Windows Xp
Microsoft Windows Server 2003
Microsoft Windows Server 2008 R2
Microsoft Windows 7
Microsoft Windows 8 -
Microsoft Windows Server 2012 -
Microsoft Windows Vista
Microsoft Windows Server 2008
3 EDB exploits
3 Articles
NA
CVE-2014-3802
msdia.dll in Microsoft Debug Interface Access (DIA) SDK, as distributed in Microsoft Visual Studio prior to 2013, does not properly validate an unspecified variable before use in calculating a dynamic-call address, which allows remote malicious users to execute arbitrary code or ...
Microsoft Visual Studio 2003
Microsoft Visual Studio 2005
Microsoft Visual Studio 2010
Microsoft Visual Studio 2002
Microsoft Debug Interface Access Software Development Kit -
Microsoft Visual Studio
NA
CVE-2013-2551
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "In...
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
1 EDB exploit
4 Articles
NA
CVE-2013-0018
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SetCapture Use After Free Vulnerability."
Microsoft Internet Explorer 9
Microsoft Internet Explorer 6
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
NA
CVE-2013-0028
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CObjectElement Use After Free Vulnerability."
Microsoft Internet Explorer 6
Microsoft Internet Explorer 9
Microsoft Internet Explorer 8
Microsoft Internet Explorer 7
NA
CVE-2013-1309
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerabil...
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 6
1 EDB exploit
NA
CVE-2013-3880
The App Container feature in the kernel-mode drivers in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote malicious users to bypass intended access restrictions and obtain sensitive information from a different container via a Trojan horse application, aka &q...
Microsoft Windows 8 -
Microsoft Windows Rt -
Microsoft Windows Server 2012 -
NA
CVE-2013-1297
Microsoft Internet Explorer 6 through 8 does not properly restrict data access by VBScript, which allows remote malicious users to perform cross-domain reading of JSON files via a crafted web site, aka "JSON Array Information Disclosure Vulnerability."
Microsoft Internet Explorer 8
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
1 Github repository
NA
CVE-2013-3186
The Protected Mode feature in Microsoft Internet Explorer 7 through 10 on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly implement the Integrity Access Level (aka IL) protection mechanism, whi...
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
camera
bypass
CVE-2024-3592
CVE-2024-37383
CVE-2024-24919
CVE-2024-27822
CVE-2024-36788
CVE-2024-36789
man-in-the-middle
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »