TROYANOSYVIRUS
Volver a CVEs

CVE-2013-2551

HIGHCISA KEV
8.8

Descripcion

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.

Detalles CVE

Puntuacion CVSS v3.18.8
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioREQUIRED
Publicado3/11/2013
Ultima modificacion4/21/2026
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorMicrosoft
ProductoInternet Explorer
Nombre vulnerabilidadMicrosoft Internet Explorer Use-After-Free Vulnerability
Fecha inclusion KEV2022-03-28
Fecha limite remediacion2022-04-18
Uso en ransomwareKnown

Productos afectados

microsoft:internet_explorermicrosoft:windows_7microsoft:windows_8microsoft:windows_rtmicrosoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_vistamicrosoft:windows_xp

Debilidades (CWE)

CWE-416CWE-416

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.