Difference between revisions of "CVE-2013-2551"
(Created page with "{{Vuln |target=Microsoft Internet Explorer }}") |
|||
Line 1: | Line 1: | ||
{{Vuln | {{Vuln | ||
|Description=Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309. | |||
|target=Microsoft Internet Explorer | |target=Microsoft Internet Explorer | ||
}} | }} |
Latest revision as of 16:09, 6 August 2015
MITRE CVE Reference: CVE-2013-2551
Description: Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, as demonstrated by VUPEN during a Pwn2Own competition at CanSecWest 2013, aka "Internet Explorer Use After Free Vulnerability," a different vulnerability than CVE-2013-1308 and CVE-2013-1309.
Usage
Targetted asset: Microsoft Internet Explorer
Exploit kits using this vulnerability/ Exploit kits utilisant cette vulnérabilité:
- Exploit kits: Angler, Archie, Astrum, Fiesta, Flash (Exploit kit), Infinity (Exploit kit), Magnitude, Niteris, Nuclear Pack, Null Hole, RIG, RedKit, Sweet Orange
Botnets using this vulnerability to function/propagate:
- Botnets:
Campaigns using this vulnerability:
- Campaigns:
Packages includingthis vulnerability:
- Packages:
Publications
Author | Editor | Year | |
---|---|---|---|
An overview of exploit packs | Mila Parkour | Contagio | 2012 |
MITRE CVE LICENSE: The MITRE Corporation (MITRE) hereby grants you a non-exclusive, royalty-free license to use Common Vulnerabilities and Exposures (CVE®) for research, development, and commercial purposes. Any copy you make for such purposes is authorized provided that you reproduce MITRE’s copyright designation and this license in any such copy. MITRE CVE®, TERMS OF USE: [1]