CVE-2010-3962

Scores

EPSS

0.899high89.9%
0%20%40%60%80%100%

Percentile: 89.9%

CVSS

8.1high3.x
0246810

CVSS Score: 8.1/10

All CVSS Scores

CVSS 3.x
8.1

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
9.3

Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Description

Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an “invalid flag reference” issue or “Uninitialized Memory Corruption Vulnerability,” as exploited in the wild in November 2010.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-416

Exploits

Exploit ID: CVE-2010-3962

Source: cisa

URL: https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Exploit ID: 15418

Source: exploitdb

URL: https://www.exploit-db.com/exploits/15418

Exploit ID: 15421

Source: exploitdb

URL: https://www.exploit-db.com/exploits/15421

Exploit ID: 16551

Source: exploitdb

URL: https://www.exploit-db.com/exploits/16551

Vulnerable Software (3)

Type: Configuration

Vendor: *

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:6:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": ...

Source: nvd

Type: Configuration

Vendor: *

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:7:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": ...

Source: nvd

Type: Configuration

Vendor: *

Product: internet_explorer

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*",          "vulnerable": true        }      ],      "operator": ...

Source: nvd

End of list