{ "schema_version": "1.4.0", "id": "GHSA-cmwj-g9pr-hgfp", "modified": "2022-05-02T06:19:06Z", "published": "2022-05-02T06:19:06Z", "aliases": [ "CVE-2010-1118" ], "details": "Unspecified vulnerability in Internet Explorer 8 on Microsoft Windows 7 allows remote attackers to execute arbitrary code via unknown vectors, possibly related to a use-after-free issue, as demonstrated by Peter Vreugdenhil during a Pwn2Own competition at CanSecWest 2010.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1118" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/57197" }, { "type": "WEB", "url": "http://dvlabs.tippingpoint.com/blog/2010/02/15/pwn2own-2010" }, { "type": "WEB", "url": "http://news.cnet.com/8301-27080_3-20001126-245.html" }, { "type": "WEB", "url": "http://twitter.com/thezdi/statuses/11003801960" }, { "type": "WEB", "url": "http://vreugdenhilresearch.nl/Pwn2Own-2010-Windows7-InternetExplorer8.pdf" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-03-25T21:00:00Z" } }