|
291381
|
- |
|
microsoft
|
publisher
|
Microsoft Publisher 2003 SP3 does not properly validate the size of an unspecified array, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Negative…
|
CWE-20
Improper Input Validation
|
CVE-2013-1316
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291382
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet E…
|
CWE-416
Use After Free
|
CVE-2013-1312
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291383
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer…
|
CWE-416
Use After Free
|
CVE-2013-1311
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291384
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Ex…
|
CWE-416
Use After Free
|
CVE-2013-1310
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291385
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Intern…
|
CWE-416
Use After Free
|
CVE-2013-1309
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291386
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Intern…
|
CWE-416
Use After Free
|
CVE-2013-1308
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291387
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Ex…
|
CWE-416
Use After Free
|
CVE-2013-1307
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291388
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer…
|
CWE-416
Use After Free
|
CVE-2013-1306
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291389
|
- |
|
microsoft
|
windows_rt windows_8 windows_server_2012
|
HTTP.sys in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (infinite loop) via a crafted HTTP header, aka "HTTP.sys Denial of Service Vu…
|
CWE-399
Resource Management Errors
|
CVE-2013-1305
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
291390
|
- |
|
microsoft
|
lync lync_server office_communicator
|
Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an invitation…
|
CWE-119
Incorrect Access of Indexable Resource ('Range Error')
|
CVE-2013-1302
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|