Page 81 of 686 results (0.015 seconds)

CVSS: 4.3EPSS: 0%CPEs: 5EXPL: 0

Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." Microsoft Internet Explorer 7 hasta 11 permite a atacantes remotos ganar privilegios a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la elevación de privilegios de Internet Explorer.' • http://www.securityfocus.com/bid/72932 http://www.securitytracker.com/id/1031888 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 9.3EPSS: 22%CPEs: 7EXPL: 0

vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 8 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." vbscript.dll en Microsoft VBScript 5.6 hasta 5.8, utilizado con Internet Explorer 8 hasta 11 y otros productos, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de corrupción de memoria de VBScript.' • http://www.securityfocus.com/bid/72910 http://www.securitytracker.com/id/1031887 http://www.securitytracker.com/id/1031888 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-019 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 62%CPEs: 4EXPL: 0

Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." Microsoft Internet Explorer 8 hasta 11 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sito web manipulado, también conocido como 'vulnerabilidad de la corrupción de memoria de Internet Explorer.' This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of CGeneratedTreeNode objects. By manipulating a document's elements an attacker can force a dangling pointer to be reused after it has been freed. • http://www.securityfocus.com/bid/72929 http://www.securitytracker.com/id/1031888 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 47%CPEs: 1EXPL: 0

Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." Microsoft Internet Explorer 10 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de la corrupción de memoria de Internet Explorer.' This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability lies in Internet Explorer's key frame creation and its handling of CSS values. An array containing pointers to CSS values can be manipulated with certain CSS directives forcing MSHTML! • http://www.securityfocus.com/bid/72925 http://www.securitytracker.com/id/1031888 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-018 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 60%CPEs: 2EXPL: 0

Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." Microsoft Internet Explorer 9 y 10 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de corrupción de memoria de Internet Explorer.' • http://www.securityfocus.com/bid/72425 http://www.securitytracker.com/id/1031723 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-009 • CWE-399: Resource Management Errors •