|
288431
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet E…
|
CWE-416
Use After Free
|
CVE-2013-1312
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
288432
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer…
|
CWE-416
Use After Free
|
CVE-2013-1311
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
288433
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Ex…
|
CWE-416
Use After Free
|
CVE-2013-1310
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
288434
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Intern…
|
CWE-416
Use After Free
|
CVE-2013-1309
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
288435
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Intern…
|
CWE-416
Use After Free
|
CVE-2013-1308
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
288436
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Ex…
|
CWE-416
Use After Free
|
CVE-2013-1307
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
288437
|
- |
|
microsoft
|
internet_explorer
|
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer…
|
CWE-416
Use After Free
|
CVE-2013-1306
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
288438
|
- |
|
microsoft
|
windows_rt windows_8 windows_server_2012
|
HTTP.sys in Microsoft Windows 8, Windows Server 2012, and Windows RT allows remote attackers to cause a denial of service (infinite loop) via a crafted HTTP header, aka "HTTP.sys Denial of Service Vu…
|
CWE-399
Resource Management Errors
|
CVE-2013-1305
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
288439
|
- |
|
microsoft
|
lync lync_server office_communicator
|
Microsoft Communicator 2007 R2, Lync 2010, Lync 2010 Attendee, and Lync Server 2013 do not properly handle objects in memory, which allows remote attackers to execute arbitrary code via an invitation…
|
CWE-119
Incorrect Access of Indexable Resource ('Range Error')
|
CVE-2013-1302
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|
|
288440
|
- |
|
microsoft
|
visio
|
Microsoft Visio 2003 SP3 2007 SP3, and 2010 SP1 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, …
|
CWE-200
Information Exposure
|
CVE-2013-1301
|
2024-11-21 10:49 |
2013-05-15 |
Show
|
GitHub
Exploit DB
Packet Storm
|
|
|