CVE-2015-2452 – Microsoft Internet Explorer CStyleAttrArray Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-2452
Microsoft Internet Explorer 7 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2441. Vulnerabilidad en Microsoft Internet Explorer 7 hasta la versión 11, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de una página web manipulada, también conocida como 'Memory Corruption Vulnerability', una vulnerabilidad diferente a CVE-2015-2441. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how Internet Explorer processes style attributes on HTML elements. By manipulating a document's elements an attacker can cause a CStyleAttrArray object in memory to be reused after it has been freed. • http://www.securityfocus.com/bid/76188 http://www.securitytracker.com/id/1033237 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2385
https://notcve.org/view.php?id=CVE-2015-2385
Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, CVE-2015-2406, and CVE-2015-2422. Desde la versión 6 a la 11 de Microsoft Internet Explorer se permite la ejecución de código arbitrario o producir una denegación de servicio (corrupción de memoria) a través de un sitio web modificado, también conocida como 'Vulnerabilidad de corrupción de Memoria en Internet Explorer', una vulnerabilidad diferente a CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, CVE-2015-2406 y CVE-2015-2422. • http://www.securitytracker.com/id/1032894 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2372
https://notcve.org/view.php?id=CVE-2015-2372
vbscript.dll in Microsoft VBScript 5.6 through 5.8, as used with Internet Explorer 6 through 11 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "VBScript Memory Corruption Vulnerability." vbscript.dll en Microsoft VBScript versión 5.6 a la 5.8, tal como se utiliza con Internet Explorer versión 6 a la 11 y otros productos, permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicios mediante la corrupción de memoria a través de un sitio web específicamente diseñado para este fin, error conocido como 'VBScript Memory Corruption Vulnerability.' • http://www.securitytracker.com/id/1032894 http://www.securitytracker.com/id/1032895 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-066 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2015-2402 – Microsoft Internet Explorer EditWith Broker API Sandbox Escape Vulnerability
https://notcve.org/view.php?id=CVE-2015-2402
Microsoft Internet Explorer 7 through 11 allows remote attackers to gain privileges via a crafted web site, aka "Internet Explorer Elevation of Privilege Vulnerability." Desde la versión 7 a la versión 11 de Microsoft Internet Explorer se permite a atacantes remotos escalada de privilegios a través de sitios web manipulados, también conocida como 'Vulnerabilidad de Evaluación de Privilegios de Internet Explorer'. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Internet Explorer running in either Protected Mode or Enhanced Protected Mode. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the EditWith function of the document broker. The document broker can be induced to use a file path from a registry key that is controlled by the low integrity process. • http://www.securityfocus.com/bid/75677 http://www.securitytracker.com/id/1032894 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-1738
https://notcve.org/view.php?id=CVE-2015-1738
Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2388. Microsoft Internet Explorer versión 8 y 9 permite a atacantes remotos ejecutar código de forma arbitraria o causar una denegación de servicios mediante la corrupción de memoria través de un sitio web específicamente diseñado para este fin, error conocido como 'Internet Explorer Memory Corruption Vulnerability,' una vulnerabilidad diferente de la CVE-2015-2388. • http://www.securitytracker.com/id/1032894 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-065 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •