{"containers":{"cna":{"title":"Internet Explorer Memory Corruption Vulnerability","datePublic":"2021-03-09T08:00:00.000Z","affected":[{"vendor":"Microsoft","product":"Internet Explorer 9","cpes":["cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"],"platforms":["Windows Server 2008 for 32-bit Systems Service Pack 2","Windows Server 2008 for x64-based Systems Service Pack 2"],"versions":[{"version":"1.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Internet Explorer 11","cpes":["cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*"],"platforms":["Windows 10 Version 1803 for 32-bit Systems","Windows 10 Version 1803 for x64-based Systems","Windows 10 Version 1803 for ARM64-based Systems","Windows 10 Version 1809 for 32-bit Systems","Windows 10 Version 1809 for x64-based Systems","Windows 10 Version 1809 for ARM64-based Systems","Windows Server 2019","Windows 10 Version 1909 for 32-bit Systems","Windows 10 Version 1909 for x64-based Systems","Windows 10 Version 1909 for ARM64-based Systems","Windows 10 Version 1903 for x64-based Systems","Windows 10 Version 1903 for ARM64-based Systems","Windows 10 Version 2004 for 32-bit Systems","Windows 10 Version 2004 for ARM64-based Systems","Windows 10 Version 2004 for x64-based Systems","Windows 10 Version 20H2 for 32-bit Systems","Windows 10 Version 20H2 for ARM64-based Systems","Windows 10 for 32-bit Systems","Windows 10 for x64-based Systems","Windows 10 Version 1607 for 32-bit Systems","Windows 10 Version 1607 for x64-based Systems","Windows 7 for 32-bit Systems Service Pack 1","Windows 7 for x64-based Systems Service Pack 1","Windows 8.1 for 32-bit systems","Windows 8.1 for x64-based systems","Windows RT 8.1","Windows Server 2008 R2 for x64-based Systems Service Pack 1","Windows Server 2012","Windows Server 2012 R2","Windows Server 2016"],"versions":[{"version":"1.0.0","lessThan":"publication","versionType":"custom","status":"affected"}]},{"vendor":"Microsoft","product":"Microsoft Edge (EdgeHTML-based)","cpes":["cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"],"platforms":["Windows 10 Version 1803 for 32-bit Systems","Windows 10 Version 1803 for x64-based Systems","Windows 10 Version 1803 for ARM64-based Systems","Windows 10 Version 1809 for 32-bit Systems","Windows 10 Version 1809 for x64-based Systems","Windows 10 Version 1809 for ARM64-based Systems","Windows Server 2019","Windows 10 Version 1909 for 32-bit Systems","Windows 10 Version 1909 for x64-based Systems","Windows 10 Version 1909 for ARM64-based Systems","Windows 10 Version 1903 for x64-based Systems","Windows 10 Version 1903 for ARM64-based Systems","Windows 10 Version 2004 for 32-bit Systems","Windows 10 Version 2004 for ARM64-based Systems","Windows 10 Version 2004 for x64-based Systems","Windows 10 Version 20H2 for 32-bit Systems","Windows 10 Version 20H2 for ARM64-based Systems","Windows 10 for 32-bit Systems","Windows 10 for x64-based Systems","Windows 10 Version 1607 for 32-bit Systems","Windows 10 Version 1607 for x64-based Systems","Windows Server 2016"],"versions":[{"version":"1.0..0","lessThan":"publication","versionType":"custom","status":"affected"}]}],"descriptions":[{"value":"Internet Explorer Memory Corruption Vulnerability","lang":"en-US"}],"problemTypes":[{"descriptions":[{"description":"Remote Code Execution","lang":"en-US","type":"Impact"}]}],"providerMetadata":{"orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft","dateUpdated":"2023-12-29T20:08:47.392Z"},"references":[{"tags":["x_refsource_MISC"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26411"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en-US","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","baseSeverity":"HIGH","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:L/E:P/RL:O/RC:C"}}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T20:26:25.344Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26411"}]},{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2021-26411","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-02-04T19:14:46.489989Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2021-11-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-26411"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-26411","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-416","description":"CWE-416 Use After Free"}]}],"timeline":[{"time":"2021-11-03T00:00:00.000Z","lang":"en","value":"CVE-2021-26411 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:25:52.201Z"}}]},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2021-26411","datePublished":"2021-03-11T15:07:28.000Z","dateReserved":"2021-01-29T00:00:00.000Z","dateUpdated":"2025-10-21T23:25:52.201Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}