Detect date
?
|
09/08/2015 |
Severity
?
|
Critical |
Description
|
Multiple serious vulnerabilities have been found in Internet Explorer. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges or obtain sensitive information. Below is a complete list of vulnerabilities
Technical details Vulnerability (2) doesn’t itself allow arbitrary code execution but combined with another vulnerability could be exploited to run arbitrary code with elevated privileges. Exploitation of vulnerability (3) could lead to disclosure of memory content. (4) caused by accessing files with improper flag and can lead low privilege process to delete arbitrary files. |
Affected products
|
Internet Explorer versions from 7 through 11 |
Solution
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Original advisories
|
CVE-2015-2483 |
Impacts
?
|
ACE [?] OSI [?] DoS [?] SB [?] WLF [?] PE [?] |
Related products
|
Microsoft Internet Explorer |
CVE-IDS
?
|
CVE-2015-24835.0Critical
CVE-2015-24939.3Critical CVE-2015-24929.3Critical CVE-2015-24909.3Critical CVE-2015-25019.3Critical CVE-2015-24949.3Critical CVE-2015-25009.3Critical CVE-2015-24894.3Warning CVE-2015-25419.3Critical CVE-2015-25429.3Critical CVE-2015-24919.3Critical CVE-2015-24999.3Critical CVE-2015-24989.3Critical CVE-2015-24869.3Critical CVE-2015-24859.3Critical CVE-2015-24846.4High CVE-2015-24879.3Critical |
Microsoft official advisories
|
Microsoft Security Update Guide |
KB list
|
|
Find out the statistics of the vulnerabilities spreading in your region |