CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.7%
Multiple serious vulnerabilities have been found in Microsoft Internet Explorer. Malicious users can exploit these vulnerabilities to read local files, cause denial of service, bypass security restrictions, execute arbitrary code, gain privileges or obtain sensitive information.
Below is a complete list of vulnerabilities
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2015-2372 critical
CVE-2015-2388 critical
CVE-2015-2389 critical
CVE-2015-2408 critical
CVE-2015-2425 critical
CVE-2015-2403 critical
CVE-2015-2402 warning
CVE-2015-2404 critical
CVE-2015-2406 critical
CVE-2015-1729 warning
CVE-2015-2412 warning
CVE-2015-2384 critical
CVE-2015-2385 critical
CVE-2015-2422 critical
CVE-2015-2390 critical
CVE-2015-2391 critical
CVE-2015-1738 critical
CVE-2015-1733 critical
CVE-2015-1767 critical
CVE-2015-2383 critical
CVE-2015-2410 warning
CVE-2015-2413 warning
CVE-2015-2414 warning
CVE-2015-2411 critical
CVE-2015-2397 critical
CVE-2015-2398 warning
CVE-2015-2419 critical
CVE-2015-2421 warning
CVE-2015-2401 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Denial of service. Exploitation of vulnerabilities with this impact can lead to loss of system availability or critical functional fault.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Read Local Files. Exploitation of vulnerabilities with this impact can lead to reading some inaccessible files. Files that can be read depends on conัrete program errors.
support.microsoft.com/kb/3065822
support.microsoft.com/kb/3072604
support.microsoft.com/kb/3076321
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-1729
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-1733
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-1738
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-1767
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2372
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2383
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2384
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2385
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2388
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2389
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2390
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2391
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2397
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2398
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2401
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2402
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2403
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2404
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2406
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2408
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2410
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2411
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2412
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2413
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2414
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2419
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2421
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2422
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2425
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.7%