CVE-2010-0805
🔴 Łataj teraz
Korupcja pamięci w kontrolce TDC w Internet Explorerze umożliwia zdalne wykonanie kodu.
CVSS
9.3
EPSS
86.1%
Exploit
none
Vendor
microsoft
Opis źródłowy (NVD)
The Tabular Data Control (TDC) ActiveX control in Microsoft Internet Explorer 5.01 SP4, 6 on Windows XP SP2 and SP3, and 6 SP1 allows remote attackers to execute arbitrary code via a long URL (DataURL parameter) that triggers memory corruption in the CTDCCtl::SecurityCHeckDataURL function, aka "Memory Corruption Vulnerability."
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.3 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 86.1% |
| Opublikowano (NVD) | 2010-03-31 19:30:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-29 01:13:23 UTC |
Referencje
- http://securitytracker.com/id?1023773 (secure@microsoft.com)
- http://www.securityfocus.com/archive/1/510507/100/0/threaded (secure@microsoft.com)
- http://www.securityfocus.com/bid/39025 (secure@microsoft.com) [Patch]
- http://www.us-cert.gov/cas/techalerts/TA10-068A.html (secure@microsoft.com) [US Government Resource]
- http://www.us-cert.gov/cas/techalerts/TA10-089A.html (secure@microsoft.com) [US Government Resource]
- http://www.vupen.com/english/advisories/2010/0744 (secure@microsoft.com) [Patch, Vendor Advisory]
- http://www.zerodayinitiative.com/advisories/ZDI-10-034 (secure@microsoft.com)
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 (secure@microsoft.com)
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8080 (secure@microsoft.com)