This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2005-12-31
Product Internet Explorer Last view 2017-06-27
Version 7 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:microsoft:internet_explorer

Activity : Overall

Related : CVE

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
7.5 2017-06-27 CVE-2014-6354

Internet Explorer 6, Internet Explorer 7, Internet Explorer 8, Internet Explorer 9, Internet Explorer 10, and Internet Explorer 11 allows remote attackers to execute arbitrary code.

8.1 2016-03-09 CVE-2015-6184

The CAttrArray object implementation in Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and memory corruption) via a malformed Cascading Style Sheets (CSS) token sequence in conjunction with modifications to HTML elements, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6048 and CVE-2015-6049.

4.3 2015-12-09 CVE-2015-6161

Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Microsoft Browser ASLR Bypass."

9.3 2015-12-09 CVE-2015-6154

Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6150.

9.3 2015-12-09 CVE-2015-6150

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6154.

9.3 2015-12-09 CVE-2015-6146

Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6145.

9.3 2015-12-09 CVE-2015-6145

Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6146.

9.3 2015-11-11 CVE-2015-6087

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6066, CVE-2015-6070, CVE-2015-6071, CVE-2015-6074, and CVE-2015-6076.

9.3 2015-11-11 CVE-2015-6076

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6066, CVE-2015-6070, CVE-2015-6071, CVE-2015-6074, and CVE-2015-6087.

9.3 2015-11-11 CVE-2015-6074

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6066, CVE-2015-6070, CVE-2015-6071, CVE-2015-6076, and CVE-2015-6087.

9.3 2015-11-11 CVE-2015-6071

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6066, CVE-2015-6070, CVE-2015-6074, CVE-2015-6076, and CVE-2015-6087.

9.3 2015-11-11 CVE-2015-6070

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6066, CVE-2015-6071, CVE-2015-6074, CVE-2015-6076, and CVE-2015-6087.

9.3 2015-11-11 CVE-2015-6066

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6070, CVE-2015-6071, CVE-2015-6074, CVE-2015-6076, and CVE-2015-6087.

9.3 2015-10-13 CVE-2015-6049

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6048.

9.3 2015-10-13 CVE-2015-6048

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-6049.

9.3 2015-09-08 CVE-2015-2500

Microsoft Internet Explorer 7 and 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability."

9.3 2015-09-08 CVE-2015-2499

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2486, CVE-2015-2487, CVE-2015-2490, CVE-2015-2492, CVE-2015-2494, and CVE-2015-2498.

9.3 2015-09-08 CVE-2015-2498

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2486, CVE-2015-2487, CVE-2015-2490, CVE-2015-2492, CVE-2015-2494, and CVE-2015-2499.

9.3 2015-09-08 CVE-2015-2494

Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2486, CVE-2015-2487, CVE-2015-2490, CVE-2015-2492, CVE-2015-2498, and CVE-2015-2499.

9.3 2015-09-08 CVE-2015-2492

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2486, CVE-2015-2487, CVE-2015-2490, CVE-2015-2494, CVE-2015-2498, and CVE-2015-2499.

9.3 2015-09-08 CVE-2015-2490

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2486, CVE-2015-2487, CVE-2015-2492, CVE-2015-2494, CVE-2015-2498, and CVE-2015-2499.

9.3 2015-09-08 CVE-2015-2487

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2486, CVE-2015-2490, CVE-2015-2492, CVE-2015-2494, CVE-2015-2498, and CVE-2015-2499.

9.3 2015-09-08 CVE-2015-2486

Microsoft Internet Explorer 7 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2487, CVE-2015-2490, CVE-2015-2492, CVE-2015-2494, CVE-2015-2498, and CVE-2015-2499.

9.3 2015-08-19 CVE-2015-2502

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," as exploited in the wild in August 2015.

9.3 2015-08-14 CVE-2015-2452

Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2441.

CWE : Common Weakness Enumeration

%idName
36% (134) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
23% (88) CWE-399 Resource Management Errors
12% (46) CWE-94 Failure to Control Generation of Code ('Code Injection')
10% (38) CWE-200 Information Exposure
5% (22) CWE-264 Permissions, Privileges, and Access Controls
4% (17) CWE-20 Improper Input Validation
1% (7) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
1% (5) CWE-416 Use After Free
0% (3) CWE-362 Race Condition
0% (3) CWE-287 Improper Authentication
0% (1) CWE-310 Cryptographic Issues
0% (1) CWE-284 Access Control (Authorization) Issues
0% (1) CWE-189 Numeric Errors
0% (1) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
0% (1) CWE-19 Data Handling
0% (1) CWE-16 Configuration

CAPEC : Common Attack Pattern Enumeration & Classification

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Name
CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters
CAPEC-7 Blind SQL Injection
CAPEC-8 Buffer Overflow in an API Call
CAPEC-9 Buffer Overflow in Local Command-Line Utilities
CAPEC-10 Buffer Overflow via Environment Variables
CAPEC-13 Subverting Environment Variable Values
CAPEC-14 Client-side Injection-induced Buffer Overflow
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-22 Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-24 Filter Failure through Buffer Overflow
CAPEC-26 Leveraging Race Conditions
CAPEC-28 Fuzzing
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-42 MIME Conversion
CAPEC-43 Exploiting Multiple Input Interpretation Layers
CAPEC-44 Overflow Binary Resource File
CAPEC-45 Buffer Overflow via Symbolic Links
CAPEC-46 Overflow Variables and Tags
CAPEC-47 Buffer Overflow via Parameter Expansion
CAPEC-52 Embedding NULL Bytes
CAPEC-53 Postfix, Null Terminate, and Backslash
CAPEC-63 Simple Script Injection
CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic

SAINT Exploits

Description Link
Internet Explorer iepeers.dll use-after-free vulnerability More info here
Internet Explorer COL SPAN Heap Overflow More info here
Internet Explorer deleted object memory corruption More info here
Microsoft Internet Explorer Time Element Memory Corruption More info here
Internet Explorer CMshtmlEd execCommand Use After Free More info here
Internet Explorer CSS clip attribute memory corruption More info here
Internet Explorer CCaret UpdateScreenCaret Memory Corruption More info here
Internet Explorer CButton Use After Free Vulnerability More info here
Internet Explorer DOM modification memory corruption More info here
Internet Explorer Eventparam use-after-free vulnerability More info here
Internet Explorer CFlatMarkupPointer Object Handling Use-after-free Vulnerability More info here
Internet Explorer HTML+TIME element OuterText memory corruption More info here
Internet Explorer VML Dashstyle Attributes Integer Overflow More info here
Internet Explorer print preview argument validation vulnerability More info here
Internet Explorer tblinf32.dll ActiveX IObjectsafety vulnerability More info here
Internet Explorer HTML Rendering Engine onLoseCapture Use-After-Free Vulnerability More info here
Internet Explorer Telnet URI Insecure Loading More info here
Internet Explorer XML data binding memory corruption More info here
Microsoft Internet Explorer CSS Import Use-After-Free Code Execution More info here
Internet Explorer CDisplayPointer Object onpropertychange Use-After-Free More info here
Internet Explorer embed tag src extension buffer overflow More info here

Open Source Vulnerability Database (OSVDB)

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
77675 Microsoft IE Content-Disposition Header Parsing Cross-Domain Remote Informati...
77606 Microsoft IE JavaScript Implementation getComputedStyle Method Page Handling ...
77537 Microsoft IE Cache Objects IFRAME Handling Browsing History Disclosure
76213 Microsoft IE Virtual Function Table Corruption mshtml.dll Extra Size Index Ha...
76212 Microsoft IE Use-after-free swapNode() Method Body Element Handling Remote Co...
76208 Microsoft IE Use-after-free Type-Safety Weakness Option Element Handling Remo...
76207 Microsoft IE OLEAuto32.dll Uninitialised Object Access Remote Memory Corruption
76206 Microsoft IE Use-after-free Scroll Event Handling Remote Code Execution
74500 Microsoft IE STYLE Object Parsing Memory Corruption
74499 Microsoft IE SetViewSlave() Function XSLT Object Markup Reloading Memory Corr...
74498 Microsoft IE Shift JIS Character Sequence Parsing Cross-domain Remote Informa...
74497 Microsoft IE Event Handler Cross-domain Remote Information Disclosure
74495 Microsoft IE window.open() Function Race Condition Memory Corruption
74494 Microsoft IE Crafted Link Telnet URI Handler Remote Program Execution
74297 Bugzilla Patch Attachment Raw Unified Viewing Mode XSS
72954 Microsoft IE Vector Markup Language (VML) Object Handling Memory Corruption
72952 Microsoft IE CDL Protocol 302 HTTP Redirect Memory Corruption
72951 Microsoft IE selection.empty JavaScript Statement onclick Event Memory Corrup...
72949 Microsoft IE Drag and Drop Information Disclosure
72948 Microsoft IE Multiple JavaScript Modifications DOM Manipulation Memory Corrup...
72947 Microsoft IE Time Element Memory Corruption
72946 Microsoft IE Drag and Drop Memory Corruption
72944 Microsoft IE SafeHTML Function XSS
72942 Microsoft IE Link Properties Handling Memory Corruption
72724 Microsoft IE Cookie Jacking Account Authentication Bypass

ExploitDB Exploits

id Description
35273 Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.1 Bypass ...
34815 Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 5.0 Bypass ...
33944 Internet Explorer 8 - Fixed Col Span ID Full ASLR, DEP & EMET 4.1.X Bypass
28974 MS13-080 Microsoft Internet Explorer CDisplayPointer Use-After-Free
28682 Micorosft Internet Explorer SetMouseCapture Use-After-Free
24017 Internet Explorer 8 - Fixed Col Span ID Full ASLR & DEP Bypass
23785 Microsoft Internet Explorer CButton Object Use-After-Free Vulnerability
20174 Microsoft Internet Explorer Fixed Table Col Span Heap Overflow
16590 Internet Explorer DHTML Behaviors Use After Free
15421 Internet Explorer 6, 7, 8 Memory Corruption 0day Exploit
15262 Microsoft Office HtmlDlgHelper Class Memory Corruption
11683 Microsoft Internet Explorer iepeers.dll Use-After-Free Exploit (meta)
11167 Internet Explorer Aurora Exploit
9893 Microsoft Internet Explorer 5,6,7 memory corruption PoC

OpenVAS Exploits

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2012-12-12 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2761465)
File : nvt/secpod_ms12-077.nasl
2012-09-18 Name : Microsoft Internet Explorer Remote Code Execution Vulnerability (2757760)
File : nvt/gb_ms_ie_code_exec_vuln_vuln.nasl
2012-08-15 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2722913)
File : nvt/secpod_ms12-052.nasl
2012-06-13 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2699988)
File : nvt/secpod_ms12-037.nasl
2012-04-11 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2675157)
File : nvt/secpod_ms12-023.nasl
2012-04-02 Name : Fedora Update for bugzilla FEDORA-2011-10399
File : nvt/gb_fedora_2011_10399_bugzilla_fc16.nasl
2012-02-15 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2647516)
File : nvt/secpod_ms12-010.nasl
2012-02-12 Name : Gentoo Security Advisory GLSA 201110-03 (bugzilla)
File : nvt/glsa_201110_03.nasl
2011-12-14 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2618444)
File : nvt/secpod_ms11-099.nasl
2011-12-09 Name : Microsoft Internet Explorer Multiple Information Disclosure Vulnerabilities
File : nvt/gb_ms_ie_mult_info_disc_vuln.nasl
2011-12-09 Name : Microsoft Internet Explorer Cache Objects History Information Disclosure Vuln...
File : nvt/gb_ms_ie_history_info_disc_vuln.nasl
2011-10-16 Name : Debian Security Advisory DSA 2322-1 (bugzilla)
File : nvt/deb_2322_1.nasl
2011-10-12 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2586448)
File : nvt/secpod_ms11-081.nasl
2011-09-21 Name : FreeBSD Ports: bugzilla
File : nvt/freebsd_bugzilla13.nasl
2011-09-14 Name : Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858)
File : nvt/secpod_ms11-074.nasl
2011-08-24 Name : Fedora Update for bugzilla FEDORA-2011-10413
File : nvt/gb_fedora_2011_10413_bugzilla_fc14.nasl
2011-08-24 Name : Fedora Update for bugzilla FEDORA-2011-10426
File : nvt/gb_fedora_2011_10426_bugzilla_fc15.nasl
2011-08-22 Name : Bugzilla Multiple Security Vulnerabilities
File : nvt/gb_bugzilla_49042.nasl
2011-08-11 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2559049)
File : nvt/secpod_ms11-057.nasl
2011-06-15 Name : Internet Explorer Vector Markup Language Remote Code Execution Vulnerability ...
File : nvt/secpod_ms11-052.nasl
2011-06-15 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2530548)
File : nvt/secpod_ms11-050.nasl
2011-06-13 Name : Microsoft Internet Explorer Cookie Hijacking Vulnerability
File : nvt/gb_ms_ie_cookie_hijacking_vuln.nasl
2011-06-13 Name : Microsoft Internet Explorer Cookie Hijacking Vulnerability
File : nvt/gb_ms_ie9_cookie_hijacking_vuln.nasl
2011-04-13 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2497640)
File : nvt/secpod_ms11-018.nasl
2011-02-09 Name : Microsoft Internet Explorer Multiple Vulnerabilities (2482017)
File : nvt/secpod_ms11-003.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0211 Cumulative Security Update for Microsoft Edge (MS15-095)
Severity: Category II - VMSKEY: V0061383
2015-A-0210 Cumulative Security Update for Microsoft Internet Explorer (MS15-094)
Severity: Category II - VMSKEY: V0061381
2015-A-0189 Cumulative Security Update for Microsoft Edge (MS15-091)
Severity: Category II - VMSKEY: V0061317
2015-A-0197 Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088)
Severity: Category II - VMSKEY: V0061313
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0188 Cumulative Security Update for Microsoft Internet Explorer (MS15-079)
Severity: Category I - VMSKEY: V0061297
2014-A-0094 Cumulative Security Update for Microsoft Internet Explorer
Severity: Category I - VMSKEY: V0052947
2014-A-0079 Cumulative Security Update for Microsoft Internet Explorer
Severity: Category I - VMSKEY: V0052493
2014-A-0072 Multiple Vulnerabilities in Microsoft Internet Explorer
Severity: Category I - VMSKEY: V0050435
2014-A-0065 Microsoft Internet Explorer Memory Corruption Vulnerability
Severity: Category I - VMSKEY: V0050205
2014-A-0048 Cumulative Security Update for Microsoft Internet Explorer
Severity: Category I - VMSKEY: V0048677
2014-A-0037 Cumulative Security Update for Microsoft Internet Explorer
Severity: Category I - VMSKEY: V0046163
2014-A-0023 Cumulative Security Update for Microsoft Internet Explorer
Severity: Category I - VMSKEY: V0044038
2014-A-0025 Microsoft VBScript Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0044034
2013-A-0223 Cumulative Security Update for Microsoft Internet Explorer
Severity: Category I - VMSKEY: V0042584
2013-A-0215 Cumulative Security Update for Microsoft Internet Explorer
Severity: Category I - VMSKEY: V0042296
2013-A-0188 Cumulative Security Update for Microsoft Internet Explorer
Severity: Category I - VMSKEY: V0040759
2011-B-0115 Multiple Vulnerabilities in Microsoft Office SharePoint
Severity: Category II - VMSKEY: V0030239
2010-A-0029 Microsoft Windows Shell Handler Remote Code Execution Vulnerability
Severity: Category II - VMSKEY: V0022683
2008-A-0090 Microsoft Internet Explorer Remote Code Execution Vulnerability
Severity: Category I - VMSKEY: V0017935
2007-A-0045 Microsoft Internet Explorer Vector Markup Language Remote Code Execution Vuln...
Severity: Category II - VMSKEY: V0014825

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-04-16 Microsoft Internet Explorer center element dynamic manipulation attempt
RuleID : 53463 - Type : BROWSER-IE - Revision : 1
2020-04-16 Microsoft Internet Explorer center element dynamic manipulation attempt
RuleID : 53462 - Type : BROWSER-IE - Revision : 1
2020-04-16 Microsoft Internet Explorer center element dynamic manipulation attempt
RuleID : 53461 - Type : BROWSER-IE - Revision : 1
2020-04-16 Microsoft Internet Explorer center element dynamic manipulation attempt
RuleID : 53460 - Type : BROWSER-IE - Revision : 1
2020-04-16 Microsoft Internet Explorer center element dynamic manipulation attempt
RuleID : 53459 - Type : BROWSER-IE - Revision : 1
2020-03-03 Microsoft Internet Explorer improper copy buffer access information disclosur...
RuleID : 52985 - Type : BROWSER-IE - Revision : 1
2020-03-03 Microsoft Internet Explorer improper copy buffer access information disclosur...
RuleID : 52984 - Type : BROWSER-IE - Revision : 1
2019-06-22 Microsoft Internet Explorer redirect to cdl protocol attempt
RuleID : 50181 - Type : BROWSER-IE - Revision : 2
2019-06-04 Javascript CollectGarbage use-after-free attempt
RuleID : 50005 - Type : BROWSER-IE - Revision : 1
2019-06-04 Javascript CollectGarbage use-after-free attempt
RuleID : 50004 - Type : BROWSER-IE - Revision : 1
2019-06-04 Microsoft Internet Explorer cdomuievent use after free attempt
RuleID : 49989 - Type : BROWSER-IE - Revision : 2
2019-06-04 Microsoft Internet Explorer cdomuievent use after free attempt
RuleID : 49988 - Type : BROWSER-IE - Revision : 2
2019-05-26 Microsoft Internet Explorer VML use after free attempt
RuleID : 49940 - Type : BROWSER-IE - Revision : 2
2018-01-11 Microsoft Internet Explorer dynamic style update memory corruption attempt
RuleID : 45154 - Type : BROWSER-IE - Revision : 2
2017-12-13 Microsoft Internet Explorer use after free attempt
RuleID : 44755 - Type : BROWSER-IE - Revision : 2
2017-12-13 Microsoft Internet Explorer use after free attempt
RuleID : 44754 - Type : BROWSER-IE - Revision : 2
2017-12-07 Microsoft Internet Explorer saveHistory use after free attempt
RuleID : 44737 - Type : BROWSER-IE - Revision : 1
2017-12-07 Microsoft Internet Explorer saveHistory use after free attempt
RuleID : 44736 - Type : BROWSER-IE - Revision : 1
2017-10-03 Microsoft Windows Shell Handler remote code execution attempt
RuleID : 44218 - Type : OS-WINDOWS - Revision : 1
2017-10-03 Microsoft Windows Shell Handler remote code execution attempt
RuleID : 44217 - Type : OS-WINDOWS - Revision : 1
2017-10-03 Microsoft Windows Shell Handler remote code execution attempt
RuleID : 44216 - Type : OS-WINDOWS - Revision : 1
2017-10-03 Internet Explorer CCaret memory corruption attempt
RuleID : 44198 - Type : BROWSER-IE - Revision : 2
2017-10-03 Internet Explorer CCaret memory corruption attempt
RuleID : 44197 - Type : BROWSER-IE - Revision : 2
2017-10-03 Internet Explorer CCaret memory corruption attempt
RuleID : 44196 - Type : BROWSER-IE - Revision : 2
2017-10-03 Internet Explorer CCaret memory corruption attempt
RuleID : 44195 - Type : BROWSER-IE - Revision : 2

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2015-12-08 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-125.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-124.nasl - Type: ACT_GATHER_INFO
2015-11-10 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-112.nasl - Type: ACT_GATHER_INFO
2015-10-13 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms15-106.nasl - Type: ACT_GATHER_INFO
2015-09-08 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-095.nasl - Type: ACT_GATHER_INFO
2015-09-08 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms15-094.nasl - Type: ACT_GATHER_INFO
2015-08-19 Name: The remote host has a web browser installed that is affected by a remote code...
File: smb_nt_ms15-093.nasl - Type: ACT_GATHER_INFO
2015-08-12 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-081.nasl - Type: ACT_GATHER_INFO
2015-08-11 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-079.nasl - Type: ACT_GATHER_INFO
2015-08-11 Name: The remote Windows host is affected by an information disclosure vulnerability.
File: smb_nt_ms15-088.nasl - Type: ACT_GATHER_INFO
2015-08-11 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-091.nasl - Type: ACT_GATHER_INFO
2015-07-15 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-065.nasl - Type: ACT_GATHER_INFO
2015-06-09 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-056.nasl - Type: ACT_GATHER_INFO
2015-06-05 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-009.nasl - Type: ACT_GATHER_INFO
2015-05-12 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-043.nasl - Type: ACT_GATHER_INFO
2015-04-14 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-032.nasl - Type: ACT_GATHER_INFO
2015-03-10 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms15-018.nasl - Type: ACT_GATHER_INFO
2014-12-09 Name: Arbitrary code can be executed on the remote host through the installed VBScr...
File: smb_nt_ms14-084.nasl - Type: ACT_GATHER_INFO
2014-12-09 Name: The remote host has a web browser installed that is affected by multiple vuln...
File: smb_nt_ms14-080.nasl - Type: ACT_GATHER_INFO
2014-11-12 Name: The remote host has a web browser that is affected by multiple vulnerabilities.
File: smb_nt_ms14-065.nasl - Type: ACT_GATHER_INFO
2014-10-15 Name: The remote host has a web browser that is affected by multiple vulnerabilities.
File: smb_nt_ms14-056.nasl - Type: ACT_GATHER_INFO
2014-09-10 Name: The remote host has a web browser that is affected by multiple vulnerabilities.
File: smb_nt_ms14-052.nasl - Type: ACT_GATHER_INFO
2014-08-12 Name: The remote host has a web browser that is affected by multiple vulnerabilities.
File: smb_nt_ms14-051.nasl - Type: ACT_GATHER_INFO
2014-07-08 Name: The remote host has a web browser that is affected by multiple vulnerabilities.
File: smb_nt_ms14-037.nasl - Type: ACT_GATHER_INFO
2014-06-11 Name: The remote host has a web browser that is affected by multiple vulnerabilities.
File: smb_nt_ms14-035.nasl - Type: ACT_GATHER_INFO