Затронутые продукты: |  | MICROSOFT : Windows XP |
|  | MICROSOFT : Windows 2003 Server |
|  | MICROSOFT : Windows Vista |
|  | MICROSOFT : Windows 2008 Server |
|  | MICROSOFT : Windows 7 |
CVE: |  | CVE-2012-4787 (Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability.") |
|  | CVE-2012-4782 (Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "CMarkup Use After Free Vulnerability.") |
|  | CVE-2012-4781 (Use-after-free vulnerability in Microsoft Internet Explorer 6 through 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "InjectHTMLStream Use After Free Vulnerability.") |