Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
User-Agent | path | /on_request_uri | Triggers an exploit leveraging a use-after-free vulnerability in Internet Explorer to execute arbitrary code. | CWE-399 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo