Microsoft Internet Explorer 6 and 7 allows remote attackers to execute arbitrary code via uninitialized or deleted objects used in repeated calls to the (1) cloneNode or (2) nodeValue JavaScript function, a different issue than CVE-2007-3902 and CVE-2007-5344, a variant of "Uninitialized Memory Corruption Vulnerability."
2007-12-12T00:46:00.000
2025-04-09T00:30:58.490
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | microsoft | ie | 6.0 | Yes |
Application | microsoft | ie | 6.0 | Yes |
Application | microsoft | internet_explorer | 6 | Yes |
Application | microsoft | internet_explorer | 6 | Yes |
Application | microsoft | internet_explorer | 6.0 | Yes |
Application | microsoft | internet_explorer | 6.0.2600 | Yes |
Application | microsoft | internet_explorer | 6.0.2800 | Yes |
Application | microsoft | internet_explorer | 6.0.2800.1106 | Yes |
Application | microsoft | internet_explorer | 6.0.2900 | Yes |
Application | microsoft | internet_explorer | 6.0.2900.2180 | Yes |
Application | microsoft | internet_explorer | 7 | Yes |
Application | microsoft | internet_explorer | 7.0 | Yes |
Application | microsoft | internet_explorer | 7.0 | Yes |
Application | microsoft | internet_explorer | 7.0 | Yes |
Application | microsoft | internet_explorer | 7.0 | Yes |
Application | microsoft | internet_explorer | 7.0 | Yes |
Application | microsoft | internet_explorer | 7.0.5730.11 | Yes |