Description
Multiple serious vulnerabilities have been found in Microsoft Internet Explorer. Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- Improper memory objects access can be exploited remotely via a specially designed web site to execute arbitrary code;
- Improper memory objects handling at script engines can be exploited remotely via a specially designed web site to execute arbitrary code;
- Improper permissions validation can be exploited remotely via a specially designed web site to gain privileges;
- Improper memory disclosure can be exploited remotely to obtaib sensitive information;
- Lack of ASLR restrictions at script engines can be exploited remotely to obtain sensitive information;
- Improper memory content disclosure at script engine can be exploited remotely via a specially designed web site to obtain sensitive information.
Original advisories
- CVE-2015-6055
- CVE-2015-6059
- CVE-2015-6052
- CVE-2015-6044
- CVE-2015-6047
- CVE-2015-6056
- CVE-2015-6053
- CVE-2015-6050
- CVE-2015-6051
- CVE-2015-6048
- CVE-2015-6049
- CVE-2015-6046
- CVE-2015-6042
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2015-2482 critical
- CVE-2015-6055 critical
- CVE-2015-6059 warning
- CVE-2015-6052 warning
- CVE-2015-6044 high
- CVE-2015-6047 high
- CVE-2015-6056 critical
- CVE-2015-6053 critical
- CVE-2015-6050 critical
- CVE-2015-6051 warning
- CVE-2015-6048 critical
- CVE-2015-6049 critical
- CVE-2015-6046 warning
- CVE-2015-6042 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!