Use-after-free vulnerability in Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code by accessing an object that (1) was not properly initialized or (2) is deleted, aka "Layouts Handling Memory Corruption Vulnerability."
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2024-08-06T21:43:14.189Z
Reserved: 2010-12-21T00:00:00
Link: CVE-2011-0094

No data.

Status : Modified
Published: 2011-04-13T18:55:01.047
Modified: 2024-11-21T01:23:19.130
Link: CVE-2011-0094

No data.