Detect date
?
|
12/08/2015 |
Severity
?
|
Critical |
Description
|
Multiple serious vulnerabilities have been found in Microsoft Internet Explorer & Edge. Malicious users can exploit these vulnerabilities to spoof user interface, bypass security restrictions, inject or execute arbitrary code, gain privileges or obtain sensitive information. Below is a complete list of vulnerabilities
Technical details There some technical notes for vulnerability (3) you can read in MS15-124 listed in original advisories section. |
Affected products
|
Microsoft Internet Explorer versions 7 through 11 |
Solution
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Original advisories
|
CVE-2015-6135 |
Impacts
?
|
ACE [?] OSI [?] CI [?] SB [?] PE [?] SUI [?] |
Related products
|
Microsoft Internet Explorer |
CVE-IDS
?
|
CVE-2015-61355.0Critical
CVE-2015-61369.3Critical CVE-2015-61349.3Critical CVE-2015-61409.3Critical CVE-2015-61559.3Critical CVE-2015-60839.3Critical CVE-2015-61384.3Warning CVE-2015-61694.3Warning CVE-2015-61689.3Critical CVE-2015-61764.3Warning CVE-2015-61706.8High CVE-2015-61539.3Critical CVE-2015-61529.3Critical CVE-2015-61519.3Critical CVE-2015-61509.3Critical CVE-2015-61499.3Critical CVE-2015-61489.3Critical CVE-2015-61479.3Critical CVE-2015-61469.3Critical CVE-2015-61459.3Critical CVE-2015-61444.3Warning CVE-2015-61429.3Critical CVE-2015-61439.3Critical CVE-2015-61629.3Critical CVE-2015-61646.8High CVE-2015-61609.3Critical CVE-2015-61614.3Warning CVE-2015-61549.3Critical CVE-2015-61419.3Critical CVE-2015-61569.3Critical CVE-2015-61574.3Warning CVE-2015-61589.3Critical CVE-2015-61599.3Critical CVE-2015-61399.3Critical |
Microsoft official advisories
|
Microsoft Security Update Guide |
KB list
|
|
Exploitation
|
The following public exploits exists for this vulnerability: https://www.exploit-db.com/exploits/40878 https://www.exploit-db.com/exploits/38972 Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Find out the statistics of the vulnerabilities spreading in your region |