Microsoft Internet Explorer 6 and 7 allows remote malicious users to execute arbitrary code via uninitialized or deleted objects used in repeated calls to the (1) cloneNode or (2) nodeValue JavaScript function, a different issue than CVE-2007-3902 and CVE-2007-5344, a variant of "Uninitialized Memory Corruption Vulnerability."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft internet explorer 6.0 |
||
microsoft internet explorer 6.0.2600 |
||
microsoft internet explorer 6 |
||
microsoft internet explorer 7 |
||
microsoft internet explorer 6.0.2900 |
||
microsoft internet explorer 6.0.2900.2180 |
||
microsoft internet explorer 7.0 |
||
microsoft internet explorer 6.0.2800 |
||
microsoft internet explorer 6.0.2800.1106 |
||
microsoft internet explorer 7.0.5730.11 |
||
microsoft ie 6.0 |