CVE Vulnerabilities

CVE-2013-0025

Published: Feb 13, 2013 | Modified: Oct 12, 2018
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
Ubuntu

Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka Internet Explorer SLayoutRun Use After Free Vulnerability.

Affected Software

Name Vendor Start Version End Version
Internet_explorer Microsoft 8 (including) 8 (including)

References