[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2010-0806":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-20T17:11:50.996Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":27,"aliases":71,"duplicate_of":9,"upstream":72,"downstream":73,"duplicates":74,"related":75,"reserved_at":9,"published_at":76,"modified_at":77,"state":78,"summary":79,"references_raw":88,"kevs":167,"epss":178,"epss_history":180,"metrics":385,"affected":398},"CVE-2010-0806","Use-after-free vulnerability in the Peer Objects component (aka iepeers.dll) in Microsoft Internet Explorer 6, 6 SP1, and 7 allows remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object, as exploited in the wild in March 2010, aka \"Uninitialized Memory Corruption Vulnerability.\"",null,[11,18],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":9,"likelihood_of_exploit":9,"capec":17},"CWE-399","Resource Management Errors","Weaknesses in this category are related to improper management of system resources.","category","Draft",[],{"_key":19,"id":19,"name":20,"description":21,"type":22,"status":23,"abstraction":24,"likelihood_of_exploit":25,"capec":26},"CWE-416","Use After Free","The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory \"belongs\" to the code that operates on the new pointer.","weakness","Stable","Variant","High",[],[28,43,52],{"_key":29,"name":30,"source":31,"url":32,"maturity":33,"reliability_score":34,"verified":35,"type":36,"platforms":37,"requires_auth":9,"exploitdb":39,"metasploit":9},"11683","Microsoft Internet Explorer - 'iepeers.dll' Use-After-Free (Metasploit)","exploit-database","https://www.exploit-db.com/exploits/11683","weaponized",0.8,true,"remote",[38],"windows",{"verified":35,"type":36,"platform":38,"file":40,"codes":41},"exploits/windows/remote/11683.rb",[7,42],"OSVDB-62810",{"_key":44,"name":45,"source":31,"url":46,"maturity":33,"reliability_score":34,"verified":35,"type":36,"platforms":47,"requires_auth":9,"exploitdb":48,"metasploit":9},"16590","Microsoft Internet Explorer - DHTML Behaviour Use-After-Free (MS10-018) (Metasploit)","https://www.exploit-db.com/exploits/16590",[38],{"verified":35,"type":36,"platform":38,"file":49,"codes":50},"exploits/windows/remote/16590.rb",[7,42,51],"MS10-018",{"_key":53,"name":54,"source":55,"url":56,"maturity":33,"reliability_score":57,"verified":35,"type":36,"platforms":58,"requires_auth":59,"exploitdb":9,"metasploit":60},"MSF_EXPLOIT_WINDOWS_BROWSER_MS10_018_IE_BEHAVIORS","MS10-018 Microsoft Internet Explorer DHTML Behaviors Use After Free","metasploit","https://github.com/rapid7/metasploit-framework/blob/master/modules/exploit/windows/browser/ms10_018_ie_behaviors.rb",0.6666666666666666,[],false,{"fullname":61,"rank":62,"rank_name":63,"post_auth":59,"check":59,"notes":64},"exploit/windows/browser/ms10_018_ie_behaviors",400,"good",{"Stability":65,"SideEffects":67,"Reliability":69},[66],"unknown-stability",[68],"unknown-side-effects",[70],"unknown-reliability",[],[],[],[],[],"2010-03-10T22:00:00.000Z","2026-05-20T17:14:15.755Z","Undergoing Analysis",{"cisa_kev":35,"cisa_ransomware":59,"cisa_vendor":80,"epss_severity":81,"epss_score":82,"severity":83,"severity_score":84,"severity_version":85,"severity_source":86,"severity_vector":87,"severity_status":78},"Microsoft","critical",0.89477,"high",9.3,"v2.0","nvd","AV:N/AC:M/Au:N/C:C/I:C/A:C",[89,96,103,108,114,119,123,128,134,139,145,149,153,158,162],{"url":90,"sources":91,"tags":93},"http://osvdb.org/62810",[92,86],"cve.org",[94,95],"VDB Entry","X Refsource OSVDB",{"url":97,"sources":98,"tags":99},"http://www.us-cert.gov/cas/techalerts/TA10-089A.html",[92,86],[100,101,102],"Third Party Advisory","X Refsource CERT","US Government Resource",{"url":104,"sources":105,"tags":106},"http://www.securityfocus.com/bid/38615",[92,86],[94,107],"X Refsource BID",{"url":109,"sources":110,"tags":111},"http://www.vupen.com/english/advisories/2010/0567",[92,86],[94,112,113],"X Refsource VUPEN","Vendor Advisory",{"url":115,"sources":116,"tags":117},"http://secunia.com/advisories/38860",[92,86],[100,118,113],"X Refsource SECUNIA",{"url":120,"sources":121,"tags":122},"http://www.us-cert.gov/cas/techalerts/TA10-068A.html",[92,86],[100,101,102],{"url":124,"sources":125,"tags":126},"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018",[92,86],[113,127],"X Refsource MS",{"url":129,"sources":130,"tags":131},"http://www.microsoft.com/technet/security/advisory/981374.mspx",[92,86],[132,133,113],"X Refsource CONFIRM","Patch",{"url":135,"sources":136,"tags":137},"https://exchange.xforce.ibmcloud.com/vulnerabilities/56772",[92,86],[94,138],"X Refsource XF",{"url":140,"sources":141,"tags":142},"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8446",[92,86],[94,143,144],"Signature","X Refsource OVAL",{"url":146,"sources":147,"tags":148},"http://www.vupen.com/english/advisories/2010/0744",[92,86],[94,112,113],{"url":150,"sources":151,"tags":152},"http://blogs.technet.com/msrc/archive/2010/03/09/security-advisory-981374-released.aspx",[92,86],[132],{"url":154,"sources":155,"tags":156},"http://www.kb.cert.org/vuls/id/744549",[92,86],[100,157,133,102],"X Refsource CERT VN",{"url":159,"sources":160,"tags":161},"https://learn.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018",[92,86],[113],{"url":163,"sources":164,"tags":165},"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2010-0806",[92,86],[166],"Government Resource",[168],{"source":169,"vendor":80,"product":170,"date_added":171,"vulnerability_name":172,"short_description":173,"required_action":174,"due_date":175,"known_ransomware_campaign_use":176,"notes":177,"exploitation_type":9},"cisa","Internet Explorer","2026-05-20","Microsoft Internet Explorer Use-After-Free Vulnerability","Microsoft Internet Explorer contains an use-after-free vulnerability that could allow remote attackers to execute arbitrary code via vectors involving access to an invalid pointer after the deletion of an object. The impacted product could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.","Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","2026-06-03","Unknown","https://learn.microsoft.com/en-us/security-updates/securityadvisories/2010/981374 ; https://nvd.nist.gov/vuln/detail/CVE-2010-0806",{"date":171,"score":82,"percentile":179},0.99565,[181,185,188,190,193,196,198,200,202,204,207,209,211,213,215,218,220,223,225,227,229,232,234,236,238,240,242,244,247,249,251,253,255,257,259,261,263,265,267,269,271,273,275,277,279,281,283,285,287,289,291,293,295,298,302,304,306,309,311,314,317,319,322,324,326,328,330,332,334,336,338,341,343,346,348,351,353,355,357,359,362,364,367,369,371,373,376,378,380,382],{"date":182,"score":183,"percentile":184},"2025-11-04",0.90864,0.99603,{"date":186,"score":183,"percentile":187},"2025-11-05",0.99602,{"date":189,"score":183,"percentile":187},"2025-11-06",{"date":191,"score":183,"percentile":192},"2025-11-07",0.99601,{"date":194,"score":183,"percentile":195},"2025-11-08",0.996,{"date":197,"score":183,"percentile":195},"2025-11-09",{"date":199,"score":183,"percentile":195},"2025-11-10",{"date":201,"score":183,"percentile":195},"2025-11-11",{"date":203,"score":183,"percentile":195},"2025-11-12",{"date":205,"score":183,"percentile":206},"2025-11-13",0.99599,{"date":208,"score":183,"percentile":206},"2025-11-14",{"date":210,"score":183,"percentile":206},"2025-11-15",{"date":212,"score":183,"percentile":206},"2025-11-16",{"date":214,"score":183,"percentile":206},"2025-11-17",{"date":216,"score":183,"percentile":217},"2025-11-18",0.99708,{"date":219,"score":183,"percentile":217},"2025-11-19",{"date":221,"score":183,"percentile":222},"2025-11-20",0.99707,{"date":224,"score":183,"percentile":206},"2025-11-21",{"date":226,"score":183,"percentile":206},"2025-11-22",{"date":228,"score":183,"percentile":206},"2025-11-23",{"date":230,"score":183,"percentile":231},"2025-11-24",0.99598,{"date":233,"score":183,"percentile":231},"2025-11-25",{"date":235,"score":183,"percentile":231},"2025-11-26",{"date":237,"score":183,"percentile":206},"2025-11-27",{"date":239,"score":183,"percentile":206},"2025-11-28",{"date":241,"score":183,"percentile":231},"2025-11-29",{"date":243,"score":183,"percentile":206},"2025-11-30",{"date":245,"score":183,"percentile":246},"2025-12-01",0.99611,{"date":248,"score":183,"percentile":246},"2025-12-02",{"date":250,"score":183,"percentile":246},"2025-12-03",{"date":252,"score":183,"percentile":192},"2025-12-04",{"date":254,"score":183,"percentile":187},"2025-12-05",{"date":256,"score":183,"percentile":192},"2025-12-06",{"date":258,"score":183,"percentile":187},"2025-12-07",{"date":260,"score":183,"percentile":184},"2025-12-08",{"date":262,"score":183,"percentile":187},"2025-12-09",{"date":264,"score":183,"percentile":184},"2025-12-10",{"date":266,"score":183,"percentile":184},"2025-12-11",{"date":268,"score":183,"percentile":184},"2025-12-12",{"date":270,"score":183,"percentile":187},"2025-12-13",{"date":272,"score":183,"percentile":187},"2025-12-14",{"date":274,"score":183,"percentile":187},"2025-12-15",{"date":276,"score":183,"percentile":187},"2025-12-16",{"date":278,"score":183,"percentile":184},"2025-12-17",{"date":280,"score":183,"percentile":184},"2025-12-18",{"date":282,"score":183,"percentile":184},"2025-12-19",{"date":284,"score":183,"percentile":184},"2025-12-20",{"date":286,"score":183,"percentile":184},"2025-12-21",{"date":288,"score":183,"percentile":184},"2025-12-22",{"date":290,"score":183,"percentile":184},"2025-12-23",{"date":292,"score":183,"percentile":184},"2025-12-24",{"date":294,"score":183,"percentile":184},"2025-12-25",{"date":296,"score":183,"percentile":297},"2025-12-26",0.99604,{"date":299,"score":300,"percentile":301},"2025-12-27",0.91165,0.99625,{"date":303,"score":183,"percentile":297},"2025-12-28",{"date":305,"score":183,"percentile":297},"2025-12-29",{"date":307,"score":183,"percentile":308},"2025-12-30",0.99605,{"date":310,"score":183,"percentile":308},"2025-12-31",{"date":312,"score":183,"percentile":313},"2026-01-01",0.99616,{"date":315,"score":183,"percentile":316},"2026-01-02",0.99615,{"date":318,"score":183,"percentile":316},"2026-01-03",{"date":320,"score":183,"percentile":321},"2026-01-04",0.99606,{"date":323,"score":183,"percentile":321},"2026-01-05",{"date":325,"score":183,"percentile":308},"2026-01-06",{"date":327,"score":183,"percentile":308},"2026-01-07",{"date":329,"score":183,"percentile":308},"2026-01-08",{"date":331,"score":183,"percentile":321},"2026-01-09",{"date":333,"score":183,"percentile":321},"2026-01-10",{"date":335,"score":183,"percentile":321},"2026-01-11",{"date":337,"score":183,"percentile":321},"2026-01-12",{"date":339,"score":183,"percentile":340},"2026-01-13",0.99607,{"date":342,"score":183,"percentile":340},"2026-01-14",{"date":344,"score":183,"percentile":345},"2026-01-15",0.99608,{"date":347,"score":183,"percentile":345},"2026-01-16",{"date":349,"score":183,"percentile":350},"2026-01-17",0.99609,{"date":352,"score":183,"percentile":340},"2026-01-18",{"date":354,"score":183,"percentile":345},"2026-01-19",{"date":356,"score":183,"percentile":345},"2026-01-20",{"date":358,"score":183,"percentile":350},"2026-01-21",{"date":360,"score":183,"percentile":361},"2026-01-22",0.9961,{"date":363,"score":183,"percentile":246},"2026-01-23",{"date":365,"score":183,"percentile":366},"2026-01-24",0.99612,{"date":368,"score":183,"percentile":366},"2026-01-25",{"date":370,"score":183,"percentile":366},"2026-01-26",{"date":372,"score":183,"percentile":366},"2026-01-27",{"date":374,"score":183,"percentile":375},"2026-01-28",0.99613,{"date":377,"score":183,"percentile":375},"2026-01-29",{"date":379,"score":183,"percentile":366},"2026-01-30",{"date":381,"score":183,"percentile":375},"2026-01-31",{"date":383,"score":183,"percentile":384},"2026-02-01",0.99622,[386,396],{"source":86,"cvss_v2_0":387,"cvss_v3_0":9,"cvss_v3_1":390,"cvss_v4_0":9},{"baseScore":84,"baseSeverity":9,"vectorString":87,"impactScore":388,"exploitabilityScore":389},10,8.6,{"baseScore":391,"baseSeverity":392,"vectorString":393,"impactScore":394,"exploitabilityScore":395},8.8,"HIGH","CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",9.8,7.2,{"source":92,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":397,"cvss_v4_0":9},{"baseScore":391,"baseSeverity":392,"vectorString":393,"impactScore":394,"exploitabilityScore":395},[399,410,417],{"ecosystem":9,"name":400,"vendor":401,"product":402,"cpe_part":403,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":404},"internet explorer","microsoft","internet_explorer","a",[405,408],{"version":406,"is_range":59,"range_type":407,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"7","cpe",{"version":409,"is_range":59,"range_type":407,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"6",{"ecosystem":9,"name":411,"vendor":401,"product":412,"cpe_part":413,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":414},"windows server 2008","windows_server_2008","o",[415],{"version":416,"is_range":59,"range_type":407,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"na",{"ecosystem":9,"name":418,"vendor":401,"product":419,"cpe_part":413,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":420},"windows xp","windows_xp",[421],{"version":416,"is_range":59,"range_type":407,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9}]