Vulnerability Details : CVE-2013-0025
Public exploit exists!
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer SLayoutRun Use After Free Vulnerability."
Vulnerability category: Memory CorruptionExecute code
Products affected by CVE-2013-0025
- cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2013-0025
97.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2013-0025
-
MS13-009 Microsoft Internet Explorer SLayoutRun Use-After-Free
Disclosure Date: 2013-02-13First seen: 2020-04-26exploit/windows/browser/ms13_009_ie_slayoutrun_uafThis module exploits a use-after-free vulnerability in Microsoft Internet Explorer where a CParaElement node is released but a reference is still kept in CDoc. This memory is reused when a CDoc relayout is performed. Authors: - Scott Bell <scott.bell@security-assess
CVSS scores for CVE-2013-0025
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2013-0025
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-0025
-
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-009
Microsoft Security Bulletin MS13-009 - Critical | Microsoft Docs
-
http://www.us-cert.gov/cas/techalerts/TA13-043B.html
Microsoft Updates for Multiple Vulnerabilities | CISAThird Party Advisory;US Government Resource
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A16294
Repository / Oval Repository
Jump to