Loading...
Loading...
Microsoft Internet Explorer 7 sometimes attempts to access a deleted object, which allows remote attackers to execute arbitrary code via a crafted HTML document that triggers memory corruption, aka "Uninitialized Memory Corruption Vulnerability."
December 10, 2008
April 23, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2008-4260
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.