Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layouts Handling Memory Corruption Vulnerability."
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published: 2011-04-13T18:00:00

Updated: 2024-08-06T21:43:14.189Z

Reserved: 2010-12-21T00:00:00

Link: CVE-2011-0094

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2011-04-13T18:55:01.047

Modified: 2024-11-21T01:23:19.130

Link: CVE-2011-0094

cve-icon Redhat

No data.