CVE-2015-1712 — Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft Internet Explorer

Severity
9.3CRITICALNVD
EPSS
21.2%
top 4.32%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 13
Latest updateMay 14

Description

Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1691.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-3326-5gcc-rx5x: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted w↗2022-05-14
â–¶
GHSA
GHSA-prj9-c479-85q8: Microsoft Internet Explorer 8 and 9 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted w↗2022-05-14
â–¶

💬Community

11
Bugzilla
CVE-2015-1293 chromium-browser: Cross-origin bypass in DOM↗2015-09-02
â–¶
Bugzilla
CVE-2015-1301 chromium-browser: various fixes from internal audits↗2015-09-02
â–¶
Bugzilla
CVE-2015-1294 chromium-browser: Use-after-free in Skia↗2015-09-02
â–¶
Bugzilla
CVE-2015-1299 chromium-browser: Use-after-free in Blink↗2015-09-02
â–¶
Bugzilla
CVE-2015-1298 chromium-browser: URL validation error in extensions↗2015-09-02
â–¶
CVE-2015-1712 — Microsoft vulnerability | cvebase