Use-after-free vulnerability in Microsoft Internet Explorer 6, 7, and 8 allows remote attackers to execute arbitrary code via vectors related to Cascading Style Sheets (CSS) token sequences and the clip attribute, aka an “invalid flag reference” issue or “Uninitialized Memory Corruption Vulnerability,” as exploited in the wild in November 2010.
blogs.technet.com/b/msrc/archive/2010/11/02/microsoft-releases-security-advisory-2458511.aspx
secunia.com/advisories/42091
www.exploit-db.com/exploits/15418
www.exploit-db.com/exploits/15421
www.kb.cert.org/vuls/id/899748
www.microsoft.com/technet/security/advisory/2458511.mspx
www.securityfocus.com/bid/44536
www.securitytracker.com/id?1024676
www.symantec.com/connect/blogs/new-ie-0-day-used-targeted-attacks
www.us-cert.gov/cas/techalerts/TA10-348A.html
www.vupen.com/english/advisories/2010/2880
docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-090
exchange.xforce.ibmcloud.com/vulnerabilities/62962
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12279