Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layouts Handling Memory Corruption Vulnerability."
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2011-04-13T18:00:00
Updated: 2018-10-12T19:57:01
Reserved: 2010-12-21T00:00:00
Link: CVE-2011-0094
JSON object: View
NVD Information
Status : Modified
Published: 2011-04-13T18:55:01.047
Modified: 2023-12-07T18:38:56.693
Link: CVE-2011-0094
JSON object: View
Redhat Information
No data.
CWE