⚠ Actively exploited in ransomware campaigns
This vulnerability is on the CISA Known Exploited Vulnerabilities list and has been used in known ransomware attacks. CISA required action: The impacted product is end-of-life and should be disconnected if still in use.. Due date: 2022-06-15.

CVE-2013-0074

7 documents6 sources
Severity
7.8HIGH
EPSS
93.1%
top 0.21%
CISA KEV
KEVRansomware
Added 2022-05-25
Due 2022-06-15
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedMar 13
KEV addedMay 25
KEV dueJun 15
CISA Required Action: The impacted product is end-of-life and should be disconnected if still in use.

Description

Microsoft Silverlight 5, and 5 Developer Runtime, before 5.1.20125.0 does not properly validate pointers during HTML object rendering, which allows remote attackers to execute arbitrary code via a crafted Silverlight application, aka "Silverlight Double Dereference Vulnerability."

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages1 packages

NVDmicrosoft/silverlight5.05.1.20125.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-px5j-h582-r6p9: Microsoft Silverlight 5, and 5 Developer Runtime, before 52022-05-05
CVEList
CVE-2013-0074: Microsoft Silverlight 5, and 5 Developer Runtime, before 52013-03-13
VulnCheck
Microsoft Silverlight Double Dereference Vulnerability2013

💥Exploits & PoCs

2
Exploit-DB
Microsoft Internet Explorer - COALineDashStyleArray Unsafe Memory Access (MS12-022) (Metasploit)2013-11-27
Exploit-DB
Microsoft Silverlight - ScriptObject Unsafe Memory Access (MS13-022/MS13-087) (Metasploit)2013-03-12

📋Vendor Advisories

1
CISA
Microsoft Silverlight Double Dereference Vulnerability2022-05-25