Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an "invalid flag reference" issue or "Uninitialized Memory Corruption Vulnerability," as exploited in the wild in November 2010.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 10:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Tue, 07 Oct 2025 03:15:00 +0900

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Oct 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-10-06T00:00:00+00:00', 'dueDate': '2025-10-27T00:00:00+00:00'}


Tue, 15 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.91472}

epss

{'score': 0.91193}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2025-10-22T00:05:51.096Z

Reserved: 2010-10-14T00:00:00.000Z

Link: CVE-2010-3962

cve-icon Vulnrichment

Updated: 2024-08-07T03:26:12.283Z

cve-icon NVD

Status : Deferred

Published: 2010-11-05T17:00:02.890

Modified: 2025-10-22T01:15:39.307

Link: CVE-2010-3962

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses