Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: microsoft

Published: 2012-12-12T00:00:00

Updated: 2018-10-12T19:57:01

Reserved: 2012-09-06T00:00:00


Link: CVE-2012-4787

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2012-12-12T00:55:01.387

Modified: 2023-12-07T18:38:56.693


Link: CVE-2012-4787

JSON object: View

cve-icon Redhat Information

No data.

CWE