Page 52 of 1318 results (0.004 seconds)

CVSS: 4.3EPSS: 11%CPEs: 6EXPL: 0

Microsoft Internet Explorer 7 through 11 and Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "ASLR Bypass." Vulnerabilidad en Microsoft Internet Explorer 7 hasta la versión 11 y Edge, permite a atacantes remotos eludir el mecanismo de protección ASLR a través de una página web manipulada, también conocido como 'ASLR Bypass'. • http://www.securitytracker.com/id/1033237 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-091 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 9.3EPSS: 92%CPEs: 4EXPL: 1

Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2442. Vulnerabilidad en Microsoft Internet Explorer 8 hasta la versión 11, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de una página web manipulada, también conocida como 'Memory Corruption Vulnerability', una vulnerabilidad diferente a CVE-2015-2442. • https://www.exploit-db.com/exploits/37764 http://www.securityfocus.com/bid/76194 http://www.securitytracker.com/id/1033237 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 56%CPEs: 2EXPL: 0

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability." Vulnerabilidad en Microsoft Internet Explorer 9 y 10, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de una página web manipulada, también conocida como 'Memory Corruption Vulnerability'. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of Array's call function. The issue lies in the failure to properly ensure that the 'this' parameter is an object and not a native integer. • http://www.securityfocus.com/bid/76191 http://www.securitytracker.com/id/1033237 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 56%CPEs: 3EXPL: 0

Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2451. Vulnerabilidad en Microsoft Internet Explorer 9 hasta la versión 11, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de una página web manipulada, también conocida como 'Memory Corruption Vulnerability', una vulnerabilidad diferente a CVE-2015-2451. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how Internet Explorer processes CSS stylesheets associated with HTML documents. By manipulating a document's elements an attacker can cause a COrphanedStyleSheetArray object in memory to be reused after it has been freed. • http://www.securityfocus.com/bid/76190 http://www.securitytracker.com/id/1033237 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 56%CPEs: 3EXPL: 0

Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2450. Vulnerabilidad en Microsoft Internet Explorer 9 hasta la versión 11, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de una página web manipulada, también conocida como 'Memory Corruption Vulnerability', una vulnerabilidad diferente a CVE-2015-2450. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how Internet Explorer processes CSS stylesheets associated with HTML documents. By manipulating a document's elements an attacker can cause a COrphanedStyleSheetArray object in memory to be reused after it has been freed. • http://www.securityfocus.com/bid/76189 http://www.securitytracker.com/id/1033237 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •