NVD List
Id | Name | Description | Reject | CVSS Version | CVSS Score | Severity | Pub Date | Modified Date | Actions |
---|---|---|---|---|---|---|---|---|---|
46091 | CVE-2012-4787 | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability." | 2 | 9.3 | High | 2017-01-19 | 2013-11-02 | View | |
37551 | CVE-2013-1312 | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability." | 2 | 9.3 | High | 2017-01-18 | 2016-09-29 | View | |
36455 | CVE-2013-0023 | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CDispNode Use After Free Vulnerability." | 2 | 9.3 | High | 2017-01-18 | 2016-11-03 | View | |
46089 | CVE-2012-4782 | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability." | 2 | 9.3 | High | 2017-01-19 | 2013-11-02 | View | |
39567 | CVE-2013-3846 | Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted CSpliceTreeEngine::InsertSplice object in an HTML document, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3143 and CVE-2013-3161. | 2 | 9.3 | High | 2017-01-18 | 2013-12-30 | View |
Page 775 of 17672, showing 5 records out of 88360 total, starting on record 3871, ending on 3875