Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft internet explorer 9 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2016-0072
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-006...
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
7.5
CVSSv3
CVE-2016-0107
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-010...
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
8.8
CVSSv3
CVE-2016-3211
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2016-019...
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
6.5
CVSSv3
CVE-2016-3245
Microsoft Internet Explorer 9 through 11 allows remote malicious users to trick users into making TCP connections to a restricted port via a crafted web site, aka "Internet Explorer Security Feature Bypass Vulnerability."
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
7.5
CVSSv3
CVE-2016-3384
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
NA
CVE-2015-1705
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-168...
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
NA
CVE-2014-2782
Microsoft Internet Explorer 9 through 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-177...
Microsoft Internet Explorer 9
Microsoft Internet Explorer 11
Microsoft Internet Explorer 10
1 EDB exploit
NA
CVE-2015-0071
Microsoft Internet Explorer 9 through 11 allows remote malicious users to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass Vulnerability."
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
1 Article
7.5
CVSSv3
CVE-2018-0955
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This C...
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
1 Article
NA
CVE-2015-6046
Microsoft Internet Explorer 9 through 11 allows remote malicious users to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability."
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
HTML injection
CVE-2024-35894
SQL
CVE-2024-5105
CVE-2014-100005
CVE-2024-35895
unauthorized
CVE-2024-22120
CVE-2024-35890
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »