The vulnerability relates to how internet explorer stores the user's browsing history for forward/back navigation. By manipulating a document's elements an attacker can force a CTraveIEntry object in memory to be reused after it has been freed. An attacker can leverage this vulnerability to execute code under the context of the current process. This rule supports to defend the A6: Vulnerable and Outdated Components of OWASP Top 10 - 2021. Other reference:None