TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2013-2551

HIGHCISA KEV
8.8

Beschreibung

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.

CVE Details

CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionREQUIRED
Veroffentlicht3/11/2013
Zuletzt geandert4/21/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerMicrosoft
ProduktInternet Explorer
SchwachstellennameMicrosoft Internet Explorer Use-After-Free Vulnerability
KEV Aufnahmedatum2022-03-28
Behebungsfrist2022-04-18
Ransomware-NutzungKnown

Betroffene Produkte

microsoft:internet_explorermicrosoft:windows_7microsoft:windows_8microsoft:windows_rtmicrosoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_vistamicrosoft:windows_xp

Schwachen (CWE)

CWE-416CWE-416

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.