Microsoft : Security Vulnerabilities, CVEs, Published In May 2013 (Memory corruption)
mpengine.dll in Microsoft Malware Protection Engine before 1.1.9506.0 on x64 platforms allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file.
Max CVSS
9.3
EPSS Score
0.39%
Published
2013-05-15
Updated
2013-05-15
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1303 and CVE-2013-1304.
Max CVSS
9.3
EPSS Score
91.03%
Published
2013-05-02
Updated
2018-10-12
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Max CVSS
9.3
EPSS Score
82.23%
Published
2013-05-15
Updated
2018-10-12
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Max CVSS
9.3
EPSS Score
96.37%
Published
2013-05-15
Updated
2018-10-12
Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Max CVSS
9.3
EPSS Score
84.44%
Published
2013-05-15
Updated
2018-10-12
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
Max CVSS
9.3
EPSS Score
95.18%
Published
2013-05-15
Updated
2018-10-12
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1309 and CVE-2013-2551.
Max CVSS
9.3
EPSS Score
82.23%
Published
2013-05-15
Updated
2018-10-12
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-0811.
Max CVSS
9.3
EPSS Score
84.41%
Published
2013-05-15
Updated
2018-10-12
Use-after-free vulnerability in Microsoft Internet Explorer 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1313.
Max CVSS
9.3
EPSS Score
94.58%
Published
2013-05-15
Updated
2018-10-12
WebKit, as used in Apple iTunes before 11.0.3, allows man-in-the-middle attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via vectors related to iTunes Store browsing, a different vulnerability than other WebKit CVEs listed in APPLE-SA-2013-05-16-1.
Max CVSS
6.8
EPSS Score
0.98%
Published
2013-05-20
Updated
2018-10-30
Use-after-free vulnerability in Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1307.
Max CVSS
9.3
EPSS Score
84.41%
Published
2013-05-15
Updated
2018-10-12
11 vulnerabilities found