CVE-2013-1347
CVE Published | 2013-05-05 |
---|---|
Related CWE(s) | CWE-416: Use After Free, CWE-94: Improper Control of Generation of Code ('Code Injection') |
Related Vendor(s) | microsoft |
Related Product(s) | internet_explorer |
Exploitation Reported (CISA KEV) | 2022-03-03 |
CVSS 3 Base Score | 8.8 (HIGH) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | NETWORK |
Microsoft Internet Explorer 8 does not properly handle objects in memory, which allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly allocated or (2) is deleted, as exploited in the wild in May 2013.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph
Threat Reports Related to CVE-2013-1347
Report
Dragonfly: Cyberespionage Attacks Against Energy Suppliers
This report by Symantec details activities of the cyberespionage group known as Dragonfly. The reporting covers a campaign which initially focused ...