Total vulnerabilities in the database
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'.
Software | From | Fixed in |
---|---|---|
microsoft / internet_explorer | 9 | 9.x |
microsoft / internet_explorer | 10 | 10.x |
microsoft / internet_explorer | 11 | 11.x |