This indicates a possible attack against a memory corruption vulnerability in Microsoft Internet Explorer.
The vulnerability occurs when the vulnerable software tries to access a deleted object. A remote attacker may exploit this to execute arbitrary code.
Internet Explorer 6
Internet Explorer 7
Internet Explorer 8
System compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.