TROYANOSYVIRUS
Voltar para CVEs

CVE-2013-2551

HIGHCISA KEV
8.8

Descricao

Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.

Detalhes CVE

Pontuacao CVSS v3.18.8
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado3/11/2013
Ultima modificacao4/21/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorMicrosoft
ProdutoInternet Explorer
Nome da vulnerabilidadeMicrosoft Internet Explorer Use-After-Free Vulnerability
Data inclusao KEV2022-03-28
Prazo de remediacao2022-04-18
Uso em ransomwareKnown

Produtos afetados

microsoft:internet_explorermicrosoft:windows_7microsoft:windows_8microsoft:windows_rtmicrosoft:windows_server_2003microsoft:windows_server_2008microsoft:windows_server_2012microsoft:windows_vistamicrosoft:windows_xp

Fraquezas (CWE)

CWE-416CWE-416

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.