Описание
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
Ссылки
- Exploit
- Exploit
- Vendor Advisory
- US Government Resource
- Exploit
- Exploit
- Vendor Advisory
- US Government Resource
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:11:developer-preview:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:11:release-preview:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.81212
Высокий
8.8 High
CVSS3
9.3 Critical
CVSS2
Дефекты
CWE-399
CWE-416
Связанные уязвимости
CVSS3: 8.8
github
больше 3 лет назад
Use-after-free vulnerability in the SetMouseCapture implementation in mshtml.dll in Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code via crafted JavaScript strings, as demonstrated by use of an ms-help: URL that triggers loading of hxds.dll.
EPSS
Процентиль: 99%
0.81212
Высокий
8.8 High
CVSS3
9.3 Critical
CVSS2
Дефекты
CWE-399
CWE-416