Loading...
Loading...
Use-after-free vulnerability in Microsoft Internet Explorer 5.01 SP4, 6 through SP1, and 7 allows remote attackers to execute arbitrary code via a crafted data stream that triggers memory corruption, as demonstrated using an invalid MIME-type that does not have a registered handler.
April 8, 2008
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2008-1085
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.