TROYANOSYVIRUS
Retour aux CVEs

CVE-2013-2551

HIGHCISA KEV
8.8

Description

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.

Details CVE

Score CVSS v3.18.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurREQUIRED
Publie3/11/2013
Derniere modification4/21/2026
Sourcekev
Observations honeypot0

CISA KEV

FournisseurMicrosoft
ProduitInternet Explorer
Nom vulnerabiliteMicrosoft Internet Explorer Use-After-Free Vulnerability
Date ajout KEV2022-03-28
Date limite remediation2022-04-18
Utilise dans ransomwareKnown

Produits affectes

microsoft:internet_explorermicrosoft:windows_7microsoft:windows_8microsoft:windows_rtmicrosoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_vistamicrosoft:windows_xp

Faiblesses (CWE)

CWE-416CWE-416

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.