Количество 3
Количество 3

CVE-2014-0277
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0278 and CVE-2014-0279.
GHSA-28jh-gp7h-pj6v
Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0278 and CVE-2014-0279.

BDU:2014-00201
Уязвимость браузера Internet Explorer, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2014-0277 Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0278 and CVE-2014-0279. | CVSS2: 9.3 | 39% Средний | больше 11 лет назад |
GHSA-28jh-gp7h-pj6v Microsoft Internet Explorer 8 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2014-0278 and CVE-2014-0279. | 39% Средний | около 3 лет назад | ||
![]() | BDU:2014-00201 Уязвимость браузера Internet Explorer, позволяющая злоумышленнику выполнить произвольный код или вызвать отказ в обслуживании | CVSS2: 9.3 | 39% Средний | больше 11 лет назад |
Уязвимостей на страницу