
CVE-2015-0036 – Microsoft Internet Explorer CShadow Direction Integer Overflow Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-0036
10 Feb 2015 — Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0020, CVE-2015-0022, CVE-2015-0026, CVE-2015-0030, CVE-2015-0031, and CVE-2015-0041. Microsoft Internet Explorer 6 hasta 11 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memori... • http://www.securityfocus.com/bid/72446 • CWE-399: Resource Management Errors •

CVE-2015-0041 – Microsoft Internet Explorer CTreePos Double Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-0041
10 Feb 2015 — Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0017, CVE-2015-0020, CVE-2015-0022, CVE-2015-0026, CVE-2015-0030, CVE-2015-0031, and CVE-2015-0036. Microsoft Internet Explorer 6 hasta 11 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memori... • http://www.securityfocus.com/bid/72411 • CWE-399: Resource Management Errors •

CVE-2015-0044 – Microsoft Internet Explorer CTableLayout Out-of-Bounds Memory Access Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-0044
10 Feb 2015 — Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-8967 and CVE-2015-0050. Microsoft Internet Explorer 8 y 9 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la co... • http://www.securityfocus.com/bid/72414 • CWE-399: Resource Management Errors •

CVE-2015-0045 – Microsoft Internet Explorer CLineFull Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-0045
10 Feb 2015 — Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0053. Microsoft Internet Explorer 6 hasta 8 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la corrupción d... • http://www.securityfocus.com/bid/72415 • CWE-399: Resource Management Errors •

CVE-2015-0053 – Microsoft Internet Explorer UnitValueProperty Uninitialized Pointer Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-0053
10 Feb 2015 — Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-0045. Microsoft Internet Explorer 6 hasta 8 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la corrupción d... • http://www.securityfocus.com/bid/72421 • CWE-399: Resource Management Errors •

CVE-2014-6365 – Microsoft MS14-080 Proof of Concept
https://notcve.org/view.php?id=CVE-2014-6365
11 Dec 2014 — Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the XSS filter via a crafted attribute of an element in an HTML document, aka "Internet Explorer XSS Filter Bypass Vulnerability," a different vulnerability than CVE-2014-6328. Microsoft Internet Explorer 8 hasta 11 permite a atacantes remotos evadir el filtro XSS a través de un atributo manipulado de un elemento en un documento HTML, también conocido como 'Vulnerabilidad en evadir el filtro XSS de Internet', una vulnerabilidad difer... • https://packetstorm.news/files/id/129960 • CWE-20: Improper Input Validation •

CVE-2014-6328
https://notcve.org/view.php?id=CVE-2014-6328
11 Dec 2014 — Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the XSS filter via a crafted attribute of an element in an HTML document, aka "Internet Explorer XSS Filter Bypass Vulnerability," a different vulnerability than CVE-2014-6365. Microsoft Internet Explorer 8 hasta 11 permite a atacantes remotos evadir el filtro XSS a través de un atributo manipulado de un elemento en un documento HTML, también conocido como 'Vulnerabilidad en evadir el filtro XSS de Internet Explorer', una vulnerabili... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080 • CWE-20: Improper Input Validation •

CVE-2014-6363 – Microsoft Internet Explorer 8/9/10/11 / IIS / CScript.exe/WScript.exe VBScript - CRegExp..Execute Use of Uninitialized Memory (MS14-080/MS14-084)
https://notcve.org/view.php?id=CVE-2014-6363
11 Dec 2014 — vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." vbscript.dll en Microsoft VBScript 5.6 hasta 5.8, utilizado con Internet Explorer 6 hasta 11 y otros productos, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria... • https://packetstorm.news/files/id/139598 • CWE-399: Resource Management Errors •

CVE-2014-6374 – Microsoft Internet Explorer RtfToForeign32 Out-Of-Bounds Indexing Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2014-6374
11 Dec 2014 — Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." Microsoft Internet Explorer 6 hasta 11 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la corrupción de memoria de Internet Explorer'. This vulner... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2014-6375 – Microsoft Internet Explorer Insert Command Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2014-6375
09 Dec 2014 — Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." Microsoft Internet Explorer 8 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'Vulnerabilidad de la corrupción de memoria de Internet Explorer'. This vulnerability allows remot... • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-080 • CWE-20: Improper Input Validation •