CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
AI Score
Confidence
High
EPSS
Percentile
99.7%
Multiple serious vulnerabilities have been found in Microsoft Internet Explorer. Malicious users can exploit these vulnerabilities to bypass security restrictions, gain privileges, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2015-2482 critical
CVE-2015-6055 critical
CVE-2015-6059 warning
CVE-2015-6052 warning
CVE-2015-6044 high
CVE-2015-6047 high
CVE-2015-6056 critical
CVE-2015-6053 critical
CVE-2015-6050 critical
CVE-2015-6051 warning
CVE-2015-6048 critical
CVE-2015-6049 critical
CVE-2015-6046 warning
CVE-2015-6042 critical
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Obtain sensitive information. Exploitation of vulnerabilities with this impact can lead to capturing by abuser information, critical for user or system.
Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Read Local Files. Exploitation of vulnerabilities with this impact can lead to reading some inaccessible files. Files that can be read depends on conсrete program errors.
support.microsoft.com/kb/3093983
support.microsoft.com/kb/3094995
support.microsoft.com/kb/3094996
support.microsoft.com/kb/3096441
support.microsoft.com/kb/3097617
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-2482
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6042
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6044
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6046
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6047
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6048
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6049
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6050
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6051
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6052
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6053
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6055
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6056
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2015-6059
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/