Multiple use-after-free vulnerabilities in Microsoft Internet Explorer 6 through 11 allow remote attackers to execute arbitrary code via unspecified vectors, as demonstrated by Sebastian Apelt and Andreas Schmidt during a Pwn2Own competition at CanSecWest 2014.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Internet_explorer | Microsoft | 6 | 6 |
Internet_explorer | Microsoft | 7 | 7 |
Internet_explorer | Microsoft | 8 | 8 |
Internet_explorer | Microsoft | 9 | 9 |
Internet_explorer | Microsoft | 10 | 10 |
Internet_explorer | Microsoft | 11 | 11 |