Use-after-free vulnerability in Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer CHTML Use After Free Vulnerability."
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 16 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2025-01-16T20:50:23.454Z
Reserved: 2012-11-27T00:00:00
Link: CVE-2013-0029
Updated: 2024-08-06T14:10:56.762Z
Status : Deferred
Published: 2013-02-13T12:04:12.197
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-0029
No data.
OpenCVE Enrichment
No data.
Weaknesses