Multiple use-after-free vulnerabilities in Microsoft Internet Explorer 6 through 11 allow remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by Sebastian Apelt and Andreas Schmidt during a Pwn2Own competition at CanSecWest 2014.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Internet_explorer | Microsoft | 6 (including) | 6 (including) |
Internet_explorer | Microsoft | 7 (including) | 7 (including) |
Internet_explorer | Microsoft | 8 (including) | 8 (including) |
Internet_explorer | Microsoft | 9 (including) | 9 (including) |
Internet_explorer | Microsoft | 10 (including) | 10 (including) |
Internet_explorer | Microsoft | 11 (including) | 11 (including) |