Microsoft Internet Explorer 5.01 through 6 allows remote attackers to execute arbitrary code via crafted layout combinations involving DIV tags and HTML CSS float properties that trigger memory corruption, aka "HTML Rendering Memory Corruption Vulnerability."
2006-11-14T21:07:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 5.1 (MEDIUM)
AV:N/AC:H/Au:N/C:P/I:P/A:P
4.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | microsoft | ie | 6 | Yes |
Application | microsoft | internet_explorer | 5.1 | Yes |
Application | microsoft | internet_explorer | 5.5 | Yes |
Application | microsoft | internet_explorer | 5.5 | Yes |
Application | microsoft | internet_explorer | 5.5 | Yes |
Application | microsoft | internet_explorer | 5.5 | Yes |