Количество 3
Количество 3
CVE-2015-2484
Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary files via unspecified vectors, aka "Tampering Vulnerability."
GHSA-c4v2-w5g7-g3r4
Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary files via unspecified vectors, aka "Tampering Vulnerability."
BDU:2015-11390
Уязвимость браузера Internet Explorer, позволяющая нарушителю удалить произвольные файлы
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-2484 Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary files via unspecified vectors, aka "Tampering Vulnerability." | CVSS2: 6.4 | 21% Средний | больше 10 лет назад | |
GHSA-c4v2-w5g7-g3r4 Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary files via unspecified vectors, aka "Tampering Vulnerability." | 21% Средний | больше 3 лет назад | ||
BDU:2015-11390 Уязвимость браузера Internet Explorer, позволяющая нарушителю удалить произвольные файлы | CVSS2: 6.4 | 21% Средний | больше 10 лет назад |
Уязвимостей на страницу