What's new arround internet

Last one

Src Date (GMT) Titre Description Tags Stories Notes
ZDI.webp 2016-06-16 12:00:00 ZDI-16-367: Microsoft Edge JavaScript filter Method Out-Of-Bounds Write Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-06-16 12:00:00 ZDI-16-368: Microsoft Edge JavaScript map Method Out-Of-Bounds Write Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-06-16 12:00:00 ZDI-16-366: Microsoft Internet Explorer PerformDoDragDrop Protected Mode Sandbox Escape Vulnerability (lien direct) This vulnerability allows attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-06-15 12:00:00 ZDI-16-365: Microsoft Internet Explorer s_DestroyLinkCallback Use-After-Free Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-05-24 12:00:00 ZDI-16-355: Microsoft Edge JavaScript unshift Method Uninitialized Memory Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-05-18 12:00:00 ZDI-16-338: Microsoft Edge JavaScript shift Method Uninitialized Memory Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-05-10 12:00:00 ZDI-16-277: Microsoft Windows Media Center .MCL File Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Windows Media Center. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-05-10 12:00:00 ZDI-16-278: (Pwn2Own) Microsoft Windows xxxEndDeferWindowPosEx Window Use-After-Free Privilege Escalation Vulnerability (lien direct) This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-05-10 12:00:00 ZDI-16-279: (Pwn2Own) Microsoft Windows win32kfull.sys Surface Object Use-After-Free Privilege Escalation Vulnerability (lien direct) This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-05-10 12:00:00 ZDI-16-276: Microsoft Internet Explorer AcquireLineBoxBuilderForLayout Null Array Base Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-05-10 12:00:00 ZDI-16-275: Microsoft Internet Explorer Add-on Installer Enhanced Protected Mode Information Disclosure Vulnerability (lien direct) This vulnerability allows remote attackers to bypass the Enhanced Protected Mode sandbox of vulnerable installations of Microsoft Internet Explorer and disclose file contents. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-04-12 12:00:00 ZDI-16-233: Microsoft Edge Proxy Object Universal Cross Site Scripting Vulnerability (lien direct) This vulnerability allows remote attackers to inject arbitrary script code into arbitrary domains on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-04-12 12:00:00 ZDI-16-231: Microsoft Internet Explorer CTableLayout AddRow Out-Of-Bounds Write Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
ZDI.webp 2016-04-12 12:00:00 ZDI-16-234: Microsoft .NET Framework mscoreei DLL Planting Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft .NET Framework. User interaction is required to exploit this vulnerability in that the target must visit a malicious web page or open a malicious directory or device.
ZDI.webp 2016-04-12 12:00:00 ZDI-16-232: Microsoft Edge keyframes Out-Of-Bounds Read Remote Code Execution Vulnerability (lien direct) This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
Last update at: 2024-05-05 05:07:51
See our sources.
My email:

To see everything: Our RSS (filtrered) Twitter