
CVE-2015-2413
https://notcve.org/view.php?id=CVE-2015-2413
14 Jul 2015 — Microsoft Internet Explorer 6 through 11 allows remote attackers to determine the existence of local files via a crafted module-resource request, aka "Internet Explorer Information Disclosure Vulnerability." Microsoft Internet Explorer de la versión 6 a la 11 permite a un atacante remoto constatar la existencia de archivos a través de una petición a un módulo de recursos, también conocida como “Vulnerabilidad de Revelación de informacion en Internet Explorer.” • http://www.securitytracker.com/id/1032894 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2015-2414
https://notcve.org/view.php?id=CVE-2015-2414
14 Jul 2015 — Microsoft Internet Explorer 8 through 11 allows remote attackers to obtain sensitive browsing-history information via vectors related to image caching, aka "Internet Explorer Information Disclosure Vulnerability." Microsoft Internet Explorer en la versión 8 a la 11, permite a atacantes remotos obtener informacion sensible del historial de navegación a través de vectores relacionados con el almacenamiento en caché, error conocido como 'Internet Explorer Information Disclosure Vulnerability.' • http://www.securitytracker.com/id/1032894 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2015-2421
https://notcve.org/view.php?id=CVE-2015-2421
14 Jul 2015 — Microsoft Internet Explorer 6 through 11 allows remote attackers to bypass the ASLR protection mechanism via a crafted web site, aka "Internet Explorer ASLR Bypass." Microsoft Internet de la versión 6 a la 11 permite a atacantes remotos evadir el mecanismo de protección ASLR a través de una página web manipulada, también conocida como “Evasión ASLR en Internet Explorer.” • http://www.securitytracker.com/id/1032894 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2015-2422
https://notcve.org/view.php?id=CVE-2015-2422
14 Jul 2015 — Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, and CVE-2015-2406. Microsoft Internet Explorer de la versión 6 a la 11 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de ... • http://www.securitytracker.com/id/1032894 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-2388 – Microsoft Internet Explorer CTableCell colspan Improper Indexing Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-2388
14 Jul 2015 — Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1738. Microsoft Internet Explorer 8 y 9 permiten a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de una página web manipulada, también conocida como “Vulnerabilidad de corrupción de Memo... • http://www.securitytracker.com/id/1032894 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-2397 – Microsoft Internet Explorer CTableSection Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-2397
14 Jul 2015 — Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2390, CVE-2015-2404, CVE-2015-2406, and CVE-2015-2422. Microsoft Internet Explorer en la versión 6 a la 11, permite a atacantes remotos la ejecución de código arbitrario o causar una denegación de servicio mediante la corrupción de la m... • http://www.securitytracker.com/id/1032894 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-2404 – Microsoft Internet Explorer applet Element Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-2404
14 Jul 2015 — Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2390, CVE-2015-2397, CVE-2015-2406, and CVE-2015-2422. Microsoft Internet Explorer de la versión 6 a la 11 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de ... • http://www.securitytracker.com/id/1032894 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-2406 – Microsoft Internet Explorer CTableRow Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-2406
14 Jul 2015 — Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2385, CVE-2015-2390, CVE-2015-2397, CVE-2015-2404, and CVE-2015-2422. Microsoft Internet Explorer de la versión 6 a la 11 permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de ... • http://www.securitytracker.com/id/1032894 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2015-1687
https://notcve.org/view.php?id=CVE-2015-1687
10 Jun 2015 — Microsoft Internet Explorer 6 through 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability." Microsoft Internet Explorer 6 hasta 9 permite a atacantes remotos ejecutar código arbitrario p causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocido como 'vulnerabilidad de corrupción de memoria de Internet Explorer.' • http://www.securitytracker.com/id/1032521 • CWE-19: Data Processing Errors •

CVE-2015-1735 – Microsoft Internet Explorer hr Element Uninitialized Variable Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2015-1735
10 Jun 2015 — Microsoft Internet Explorer 6 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1740, CVE-2015-1744, CVE-2015-1745, and CVE-2015-1766. Microsoft Internet Explorer 6 hasta 11 permite a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, tambi... • http://www.securityfocus.com/bid/74972 • CWE-399: Resource Management Errors •