Use-after-free vulnerability in mstime.dll in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via vectors related to the TIME2 behavior, the CTimeAction object, and destruction of markup, leading to memory corruption, aka "HTML Object Memory Corruption Vulnerability."
Metrics
Affected Vendors & Products
References
History
Mon, 21 Oct 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Microsoft ie
|
|
CPEs | cpe:2.3:a:microsoft:ie:8:*:*:*:*:*:*:* | |
Vendors & Products |
Microsoft ie
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-10-21T16:44:40.304Z
Reserved: 2010-02-02T00:00:00
Link: CVE-2010-0492

Updated: 2024-08-07T00:52:19.464Z

Status : Modified
Published: 2010-03-31T19:30:00.517
Modified: 2024-11-21T01:12:19.553
Link: CVE-2010-0492

No data.