|
287601
|
- |
|
microsoft
|
publisher
|
Microsoft Publisher 2003 SP3 does not properly check the return value of an unspecified method, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Re…
|
NVD-CWE-Other
|
CVE-2013-1319
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
287602
|
- |
|
microsoft
|
publisher
|
Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers access to an invalid pointer, aka "Publisher Corrupt Interface Pointer Vulner…
|
CWE-20
Improper Input Validation
|
CVE-2013-1318
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
287603
|
- |
|
microsoft
|
publisher
|
Integer overflow in Microsoft Publisher 2003 SP3 allows remote attackers to execute arbitrary code via a crafted Publisher file that triggers an improper allocation-size calculation, aka "Publisher I…
|
CWE-190
Integer Overflow or Wraparound
|
CVE-2013-1317
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
287604
|
- |
|
microsoft
|
publisher
|
Microsoft Publisher 2003 SP3 does not properly validate the size of an unspecified array, which allows remote attackers to execute arbitrary code via a crafted Publisher file, aka "Publisher Negative…
|
CWE-20
Improper Input Validation
|
CVE-2013-1316
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
287605
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet E…
|
CWE-416
Use After Free
|
CVE-2013-1312
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
287606
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer…
|
CWE-416
Use After Free
|
CVE-2013-1311
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
287607
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Ex…
|
CWE-416
Use After Free
|
CVE-2013-1310
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
287608
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Intern…
|
CWE-416
Use After Free
|
CVE-2013-1309
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
287609
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Intern…
|
CWE-416
Use After Free
|
CVE-2013-1308
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
287610
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Ex…
|
CWE-416
Use After Free
|
CVE-2013-1307
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|