Описание
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
Ссылки
- Third Party AdvisoryUS Government Resource
- Third Party AdvisoryUS Government Resource
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:microsoft:internet_explorer:8:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.46068
Средний
9.3 Critical
CVSS2
Дефекты
CWE-416
Связанные уязвимости
github
больше 3 лет назад
Use-after-free vulnerability in Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code via a crafted web site that triggers access to a deleted object, aka "Internet Explorer Use After Free Vulnerability."
EPSS
Процентиль: 98%
0.46068
Средний
9.3 Critical
CVSS2
Дефекты
CWE-416