Loading...
Loading...
Use-after-free vulnerability in Microsoft Internet Explorer 9 and 10 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to an object that (1) was not properly initialized or (2) is deleted, aka "Improper Ref Counting Use After Free Vulnerability."
December 12, 2012
April 29, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2012-4787
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.