Description
Multiple serious vulnerabilities have been found in Microsoft Internet Explorer. Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper ASLR handling can be exploited remotely via a specially designed web site;
- An improper permissions validation can be exploited remotely via a specially designed web site;
- An improper access restrictions can be exploited remotely via a specially designed web page;
- Improper memory handling can be exploited remotely via a specially designed web page.
Original advisories
- CVE-2015-1686
- CVE-2015-1684
- CVE-2015-1703
- CVE-2015-1706
- CVE-2015-1705
- CVE-2015-1704
- CVE-2015-1709
- CVE-2015-1708
- CVE-2015-1685
- CVE-2015-1688
- CVE-2015-1689
- CVE-2015-1718
- CVE-2015-1714
- CVE-2015-1717
- CVE-2015-1710
- CVE-2015-1711
- CVE-2015-1712
- CVE-2015-1713
- CVE-2015-1658
- CVE-2015-1691
- CVE-2015-1692
- CVE-2015-1694
Related products
CVE list
- CVE-2015-1686 warning
- CVE-2015-1684 warning
- CVE-2015-1703 high
- CVE-2015-1706 critical
- CVE-2015-1705 critical
- CVE-2015-1704 high
- CVE-2015-1709 critical
- CVE-2015-1708 critical
- CVE-2015-1685 warning
- CVE-2015-1688 high
- CVE-2015-1689 critical
- CVE-2015-1718 critical
- CVE-2015-1714 critical
- CVE-2015-1717 critical
- CVE-2015-1710 critical
- CVE-2015-1711 critical
- CVE-2015-1712 critical
- CVE-2015-1713 high
- CVE-2015-1658 critical
- CVE-2015-1691 critical
- CVE-2015-1692 warning
- CVE-2015-1694 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!