Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6, and 6 SP1 allows remote attackers to execute arbitrary code by changing unspecified properties of an HTML object that has an onreadystatechange event handler, aka "HTML Object Memory Corruption Vulnerability."
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 01:12
Type | Values Removed | Values Added |
---|---|---|
References | () http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=864 - | |
References | () http://securitytracker.com/id?1023773 - | |
References | () http://www.securityfocus.com/bid/39027 - Patch | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-068A.html - US Government Resource | |
References | () http://www.us-cert.gov/cas/techalerts/TA10-089A.html - US Government Resource | |
References | () http://www.vupen.com/english/advisories/2010/0744 - Patch, Vendor Advisory | |
References | () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-018 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8421 - |
Information
Published : 2010-03-31 19:30
Updated : 2024-11-21 01:12
NVD link : CVE-2010-0491
Mitre link : CVE-2010-0491
CVE.ORG link : CVE-2010-0491
JSON object : View
Products Affected
microsoft
- windows_server_2003
- internet_explorer
- windows_xp
- windows_2003_server
- windows_2000
CWE
CWE-399
Resource Management Errors