CVE List

Id CVE No. Status Description Phase Votes Comments Actions
76268  CVE-2014-8967  Candidate  Use-after-free vulnerability in Microsoft Internet Explorer allows remote attackers to execute arbitrary code via a crafted HTML document in conjunction with a Cascading Style Sheets (CSS) token sequence specifying the run-in value for the display property, leading to improper CElement reference counting.  Assigned (20141118)  None (candidate not yet proposed)    View
69058  CVE-2014-1763  Candidate  Use-after-free vulnerability in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code and bypass a sandbox protection mechanism via unspecified vectors, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2014.  Assigned (20140129)  None (candidate not yet proposed)    View
67731  CVE-2014-0322  Candidate  Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via vectors involving crafted JavaScript code, CMarkup, and the onpropertychange attribute of a script element, as exploited in the wild in January and February 2014.  Assigned (20131203)  None (candidate not yet proposed)    View
58030  CVE-2012-4787  Candidate  Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."  Assigned (20120906)  None (candidate not yet proposed)    View
61259  CVE-2013-1312  Candidate  Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."  Assigned (20130112)  None (candidate not yet proposed)    View

Page 696 of 20943, showing 5 records out of 104715 total, starting on record 3476, ending on 3480

Actions