Описание
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
Ссылки
- Broken LinkThird Party Advisory
- Broken Link
- Not Applicable
- Third Party AdvisoryUS Government Resource
- PatchVendor Advisory
- Broken Link
- Broken LinkThird Party Advisory
- Broken Link
- Not Applicable
- Third Party AdvisoryUS Government Resource
- PatchVendor Advisory
- Broken Link
Уязвимые конфигурации
Одновременно
Одно из
Одновременно
Одно из
Одновременно
Одно из
Одновременно
Одно из
Одновременно
Одно из
EPSS
8.8 High
CVSS3
9.3 Critical
CVSS2
Дефекты
Связанные уязвимости
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
EPSS
8.8 High
CVSS3
9.3 Critical
CVSS2