CVE-2015-2451 – Microsoft Internet Explorer COrphanedStyleSheetArray Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-2451
Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2450. Vulnerabilidad en Microsoft Internet Explorer 9 hasta la versión 11, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de una página web manipulada, también conocida como 'Memory Corruption Vulnerability', una vulnerabilidad diferente a CVE-2015-2450. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how Internet Explorer processes CSS stylesheets associated with HTML documents. By manipulating a document's elements an attacker can cause a COrphanedStyleSheetArray object in memory to be reused after it has been freed. • http://www.securityfocus.com/bid/76189 http://www.securitytracker.com/id/1033237 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2452 – Microsoft Internet Explorer CStyleAttrArray Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-2452
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2441. Vulnerabilidad en Microsoft Internet Explorer 7 hasta la versión 11, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de una página web manipulada, también conocida como 'Memory Corruption Vulnerability', una vulnerabilidad diferente a CVE-2015-2441. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how Internet Explorer processes style attributes on HTML elements. By manipulating a document's elements an attacker can cause a CStyleAttrArray object in memory to be reused after it has been freed. • http://www.securityfocus.com/bid/76188 http://www.securitytracker.com/id/1033237 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2385
https://notcve.org/view.php?id=CVE-2015-2385
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, CVE-2015-2406, and CVE-2015-2422. Desde la versión 6 a la 11 de Microsoft Internet Explorer se permite la ejecución de código arbitrario o producir una denegación de servicio (corrupción de memoria) a través de un sitio web modificado, también conocida como 'Vulnerabilidad de corrupción de Memoria en Internet Explorer', una vulnerabilidad diferente a CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, CVE-2015-2406 y CVE-2015-2422. • http://www.securitytracker.com/id/1032894 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2389
https://notcve.org/view.php?id=CVE-2015-2389
Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1733 and CVE-2015-2411. Microsoft Internet Explorer 10 y 11 permiten a atacantes remotos la ejecución de código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de una página web manipulada, también conocida como “Vulnerabilidad de corrupción de Memoria en Internet Explorer”, una vulnerabilidad diferente a CVE-2015-1733 y a CVE-2015-2411. • http://www.securitytracker.com/id/1032894 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2372
https://notcve.org/view.php?id=CVE-2015-2372
vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." vbscript.dll en Microsoft VBScript versión 5.6 a la 5.8, tal como se utiliza con Internet Explorer versión 6 a la 11 y otros productos, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicios mediante la corrupción de memoria a través de un sitio web específicamente diseñado para este fin, error conocido como 'VBScript Memory Corruption Vulnerability.' • http://www.securitytracker.com/id/1032894 http://www.securitytracker.com/id/1032895 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-066 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •