Description
Multiple serious vulnerabilities have been found in Internet Explorer. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper memory objects access at VBScript and JScript engines and other unknown vectors can be exploited remotely via a specially designed web content to execute arbitrary code;
- Improper permissions validation can be exploited remotely via a specially designed web content;
- Improperly information disclosure can be exploited remotely via a specially designed web content to obtain sensitive information;
- Improper files interaction can be exploited via an unknown vectors to delete local files.
Technical details
Vulnerability (2) doesn’t itself allow arbitrary code execution but combined with another vulnerability could be exploited to run arbitrary code with elevated privileges.
Exploitation of vulnerability (3) could lead to disclosure of memory content.
(4) caused by accessing files with improper flag and can lead low privilege process to delete arbitrary files.
Original advisories
- CVE-2015-2493
- CVE-2015-2492
- CVE-2015-2490
- CVE-2015-2501
- CVE-2015-2494
- CVE-2015-2500
- CVE-2015-2489
- CVE-2015-2541
- CVE-2015-2542
- CVE-2015-2491
- CVE-2015-2499
- CVE-2015-2498
- CVE-2015-2486
- CVE-2015-2485
- CVE-2015-2484
- CVE-2015-2487
Related products
CVE list
- CVE-2015-2483 critical
- CVE-2015-2493 critical
- CVE-2015-2492 critical
- CVE-2015-2490 critical
- CVE-2015-2501 critical
- CVE-2015-2494 critical
- CVE-2015-2500 critical
- CVE-2015-2489 warning
- CVE-2015-2541 critical
- CVE-2015-2542 critical
- CVE-2015-2491 critical
- CVE-2015-2499 critical
- CVE-2015-2498 critical
- CVE-2015-2486 critical
- CVE-2015-2485 critical
- CVE-2015-2484 high
- CVE-2015-2487 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com