CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
99.5%
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka “Internet Explorer Use After Free Vulnerability,” a different vulnerability than CVE-2013-1308 and CVE-2013-2551.
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | internet_explorer | 6 | cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:* |
microsoft | internet_explorer | 7 | cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:* |
microsoft | internet_explorer | 8 | cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:* |
microsoft | internet_explorer | 9 | cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:* |
microsoft | internet_explorer | 10 | cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:* |
blog.skylined.nl/20161207001.html
packetstormsecurity.com/files/140094/Microsoft-Internet-Explorer-MSHTML-CDispNode-InsertSiblingNode-Use-After-Free.html
www.us-cert.gov/ncas/alerts/TA13-134A
docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-037
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16396
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16738
www.exploit-db.com/exploits/40893/