The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Microsoft IE

Internet Explorer: vulnerabilities of August 2017
An attacker can use several vulnerabilities of Microsoft products...
CERTFR-2017-AVI-257, CVE-2017-8625, CVE-2017-8635, CVE-2017-8636, CVE-2017-8641, CVE-2017-8651, CVE-2017-8653, CVE-2017-8669, VIGILANCE-VUL-23474, ZDI-17-640, ZDI-17-641
Microsoft Internet Explorer: vulnerabilities of July 2017
An attacker can use several vulnerabilities of Internet Explorer...
1233, 1237, CERTFR-2017-AVI-207, CVE-2017-8592, CVE-2017-8594, CVE-2017-8602, CVE-2017-8606, CVE-2017-8607, CVE-2017-8608, CVE-2017-8618, VIGILANCE-VUL-23200
Microsoft Internet Explorer: vulnerabilities of June 2017
An attacker can use several vulnerabilities of Internet Explorer...
CERTFR-2017-AVI-178, CVE-2017-8517, CVE-2017-8519, CVE-2017-8522, CVE-2017-8524, CVE-2017-8529, CVE-2017-8547, VIGILANCE-VUL-22963, ZDI-17-401
Adobe Flash Player: nine vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
1212, 1215, 1216, APSB17-17, CERTFR-2017-AVI-175, CVE-2017-3075, CVE-2017-3076, CVE-2017-3077, CVE-2017-3078, CVE-2017-3079, CVE-2017-3081, CVE-2017-3082, CVE-2017-3083, CVE-2017-3084, RHSA-2017:1439-01, VIGILANCE-VUL-22960, ZDI-17-399, ZDI-17-406, ZDI-17-407, ZDI-17-408
Adobe Flash Player: seven vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
1171, APSB17-15, CERTFR-2017-AVI-144, CVE-2017-3068, CVE-2017-3069, CVE-2017-3070, CVE-2017-3071, CVE-2017-3072, CVE-2017-3073, CVE-2017-3074, RHSA-2017:1219-01, SUSE-SU-2017:1238-1, VIGILANCE-VUL-22681
Internet Explorer: vulnerabilities of May 2017
An attacker can use several vulnerabilities of Internet Explorer...
CERTFR-2017-AVI-149, CVE-2017-0064, CVE-2017-0222, CVE-2017-0226, CVE-2017-0228, CVE-2017-0231, CVE-2017-0238, VIGILANCE-VUL-22682, ZDI-17-323
Internet Explorer: vulnerabilities of March 2017
An attacker can use several vulnerabilities of Microsoft products...
1076, 4013073, CERTFR-2017-AVI-079, CVE-2017-0008, CVE-2017-0009, CVE-2017-0012, CVE-2017-0018, CVE-2017-0033, CVE-2017-0040, CVE-2017-0049, CVE-2017-0059, CVE-2017-0130, CVE-2017-0149, CVE-2017-0154, MS17-006, VIGILANCE-VUL-22124, ZDI-17-169
Internet Explorer: vulnerabilities of April 2017
An attacker can use several vulnerabilities of Microsoft products...
1118, CERTFR-2017-AVI-106, CVE-2017-0201, CVE-2017-0202, CVE-2017-0210, VIGILANCE-VUL-22415
Microsoft Internet Explorer, Edge: memory corruption via HandleColumnBreakOnColumnSpanningElement
An attacker can generate a memory corruption via HandleColumnBreakOnColumnSpanningElement of Microsoft Internet Explorer, Edge, in order to trigger a denial of service, and possibly to run code...
1011, 4013071, 4013073, CERTFR-2017-ALE-003, CVE-2017-0037, MS17-006, MS17-007, VIGILANCE-VUL-21957
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
1007, 1008, 1013, 1018, 4010250, APSB17-04, CERTFR-2017-AVI-051, CERTFR-2017-AVI-055, CVE-2017-2982, CVE-2017-2984, CVE-2017-2985, CVE-2017-2986, CVE-2017-2987, CVE-2017-2988, CVE-2017-2990, CVE-2017-2991, CVE-2017-2992, CVE-2017-2993, CVE-2017-2994, CVE-2017-2995, CVE-2017-2996, MS17-005, RHSA-2017:0275-01, SUSE-SU-2017:0523-1, VIGILANCE-VUL-21834, ZDI-17-109, ZDI-17-110, ZDI-17-287
Our database contains other pages. You can request a free trial to read them.

Display information about Microsoft IE: