CVE-2010-3962
KEV
🔴 Łataj teraz
Luka use-after-free w Internet Explorer umożliwia zdalne wykonanie kodu przez atakujących.
CVSS
8.1
EPSS
88.9%
Exploit
weaponized
Vendor
microsoft
Opis źródłowy (NVD)
Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
brak
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 8.1 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 88.9% |
| Opublikowano (NVD) | 2010-11-05 17:00:02 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-22 10:35:19 UTC |
Referencje
- http://blogs.technet.com/b/msrc/archive/2010/11/02/microsoft-releases-security-advisory-2458511.aspx (secure@microsoft.com) [Vendor Advisory]
- http://secunia.com/advisories/42091 (secure@microsoft.com) [Broken Link, Vendor Advisory]
- http://www.exploit-db.com/exploits/15418 (secure@microsoft.com) [Third Party Advisory, VDB Entry]
- http://www.exploit-db.com/exploits/15421 (secure@microsoft.com) [Third Party Advisory, VDB Entry]
- http://www.kb.cert.org/vuls/id/899748 (secure@microsoft.com) [Third Party Advisory, US Government Resource]
- http://www.microsoft.com/technet/security/advisory/2458511.mspx (secure@microsoft.com) [Patch, Vendor Advisory]
- http://www.securityfocus.com/bid/44536 (secure@microsoft.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id?1024676 (secure@microsoft.com) [Broken Link, Third Party Advisory, VDB Entry]
- http://www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks (secure@microsoft.com) [Not Applicable]
- http://www.us-cert.gov/cas/techalerts/TA10-348A.html (secure@microsoft.com) [Third Party Advisory, US Government Resource]
- http://www.vupen.com/english/advisories/2010/2880 (secure@microsoft.com) [Broken Link, Vendor Advisory]
- https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090 (secure@microsoft.com) [Patch, Vendor Advisory]
- https://exchange.xforce.ibmcloud.com/vulnerabilities/62962 (secure@microsoft.com) [Third Party Advisory, VDB Entry]
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12279 (secure@microsoft.com) [Tool Signature]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-3962 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]