Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft access 2013 vulnerabilities and exploits
(subscribe to this query)
7.6
CVSSv2
CVE-2013-3186
The Protected Mode feature in Microsoft Internet Explorer 7 through 10 on Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT does not properly implement the Integrity Access Level (aka IL) protection mechanism, whi...
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
5
CVSSv2
CVE-2013-0095
Outlook in Microsoft Office for Mac 2008 prior to 12.3.6 and Office for Mac 2011 prior to 14.3.2 allows remote malicious users to trigger access to a remote URL and consequently confirm the rendering of an HTML e-mail message by including unspecified HTML5 elements and leveraging...
Microsoft Office 2008
Microsoft Office 2011
9.3
CVSSv2
CVE-2013-1310
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Microsoft Internet Explorer 7
Microsoft Internet Explorer 6
9.3
CVSSv2
CVE-2013-1312
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
9.3
CVSSv2
CVE-2013-0023
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability."
Microsoft Internet Explorer 10
Microsoft Internet Explorer 9
9.3
CVSSv2
CVE-2013-1307
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability t...
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
9.3
CVSSv2
CVE-2013-0811
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote malicious users to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability t...
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
9.3
CVSSv2
CVE-2013-1296
The Remote Desktop ActiveX control in mstscax.dll in Microsoft Remote Desktop Connection Client 6.1 and 7.0 does not properly handle objects in memory, which allows remote malicious users to execute arbitrary code via a web page that triggers access to a deleted object, and allow...
Microsoft Remote Desktop Connection 7.0
Microsoft Remote Desktop Connection 6.1
1 Article
7.2
CVSSv2
CVE-2013-5065
NDProxy.sys in the kernel in Microsoft Windows XP SP2 and SP3 and Server 2003 SP2 allows local users to gain privileges via a crafted application, as exploited in the wild in November 2013.
Microsoft Windows Xp
Microsoft Windows 2003 Server
3 EDB exploits
2 Articles
10
CVSSv2
CVE-2013-1318
Microsoft Publisher 2003 SP3 allows remote malicious users to execute arbitrary code via a crafted Publisher file that triggers access to an invalid pointer, aka "Publisher Corrupt Interface Pointer Vulnerability."
Microsoft Publisher 2003
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »