Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: microsoft
Published: 2012-12-12T00:00:00
Updated: 2018-10-12T19:57:01
Reserved: 2012-09-06T00:00:00
Link: CVE-2012-4787
JSON object: View
NVD Information
Status : Modified
Published: 2012-12-12T00:55:01.387
Modified: 2023-12-07T18:38:56.693
Link: CVE-2012-4787
JSON object: View
Redhat Information
No data.
CWE