CVE-2012-4792
HIGH KEVMicrosoft Internet Explorer <9 - Use After Free
Title source: llmDescription
Use-after-free vulnerability in Microsoft Internet Explorer 6 through 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly allocated or (2) is deleted, as demonstrated by a CDwnBindInfo object, and exploited in the wild in December 2012.
Exploits (5)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/23785
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/23754
github
STUB
31 stars
by OpenSISE · cpoc
https://github.com/OpenSISE/CVE_PoC_Collect/tree/master/RCE/internet explorer/CVE-2012-4792
metasploit
WORKING POC
NORMAL
by eromang, mahmud ab rahman, juan vazquez, sinn3r, Peter Vreugdenhil · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/ie_cbutton_uaf.rb
References (14)
Scores
CVSS v3
8.8
EPSS
0.9143
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CISA KEV
2024-07-23
VulnCheck KEV
2012-12-29
InTheWild.io
2020-09-28
ENISA EUVD
EUVD-2012-4717
CWE
CWE-416
Status
published
Products (3)
microsoft/internet_explorer
6
microsoft/internet_explorer
7
microsoft/internet_explorer
8
Published
Dec 30, 2012
KEV Added
Jul 23, 2024
Tracked Since
Feb 18, 2026