Max CVSS | 9.3 | Min CVSS | 4.3 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2015-6042 | 9.3 |
Use-after-free vulnerability in the CWindow object implementation in Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memo
|
13-02-2023 - 18:58 | 14-10-2015 - 01:59 | |
CVE-2015-6051 | 4.3 |
Microsoft Internet Explorer 10 and 11 allows remote attackers to gain privileges via a crafted web site, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Internet Explorer Elevation of Privilege Vulnerability."
|
13-02-2023 - 18:58 | 14-10-2015 - 01:59 | |
CVE-2015-6048 | 9.3 |
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability tha
|
13-02-2023 - 18:54 | 14-10-2015 - 01:59 | |
CVE-2015-6053 | 5.0 |
Microsoft Internet Explorer 11 allows remote attackers to obtain sensitive information from process memory via crafted parameters in an ArrayBuffer.slice call, aka "Internet Explorer Information Disclosure Vulnerability."
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-6052 | 4.3 |
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "VBScript and JScript
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-6046 | 4.3 |
Microsoft Internet Explorer 9 through 11 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Internet Explorer Information Disclosure Vulnerability."
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-6045 | 9.3 |
Use-after-free vulnerability in the CElement object implementation in Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript that improperly interacts w
|
12-10-2018 - 22:10 | 13-11-2015 - 03:59 | |
CVE-2015-6055 | 9.3 |
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Fi
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-6044 | 6.8 |
Microsoft Internet Explorer 8 allows remote attackers to gain privileges via a crafted web site, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Internet Explorer Elevation of Privilege Vulnerability."
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-6056 | 9.3 |
The (1) JScript and (2) VBScript engines in Microsoft Internet Explorer 9 through 11 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vul
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-6049 | 9.3 |
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability tha
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-6047 | 6.8 |
The broker EditWith feature in Microsoft Internet Explorer 8 through 11 allows remote attackers to bypass the AppContainer protection mechanism and gain privileges via a DelegateExecute launch of an arbitrary application, as demonstrated by a transit
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-6059 | 4.3 |
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka "Scriptin
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-6050 | 9.3 |
Microsoft Internet Explorer 10 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability."
|
12-10-2018 - 22:10 | 14-10-2015 - 01:59 | |
CVE-2015-2482 | 9.3 |
The Microsoft (1) VBScript 5.7 and 5.8 and (2) JScript 5.7 and 5.8 engines, as used in Internet Explorer 8 through 11 and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted
|
12-10-2018 - 22:09 | 14-10-2015 - 01:59 |