Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system, caused by improper handing of objects in memory. By persuading a victim to open specially-crafted, an attacker could exploit this vulnerability to execute arbitrary code on the system with privieges of the victim. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None