CVE-2015-2389Improper Restriction of Operations within the Bounds of a Memory Buffer in Microsoft Internet Explorer

Severity
9.3CRITICALNVD
EPSS
28.1%
top 3.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedJul 14
Latest updateMay 14

Description

Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Internet Explorer Memory Corruption Vulnerability," a different vulnerability than CVE-2015-1733 and CVE-2015-2411.

CVSS vector

AV:N/AC:M/C:C/I:C/A:CExploitability: 8.6 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

6
GHSA
GHSA-32gv-f76r-vj5h: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted2022-05-14
GHSA
GHSA-v9w4-3m67-cr79: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted2022-05-14
GHSA
GHSA-rg9g-2f45-9hgp: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted2022-05-14
CVEList
CVE-2015-2411: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted2015-07-14
CVEList
CVE-2015-2389: Microsoft Internet Explorer 10 and 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted2015-07-14

💥Exploits & PoCs

1
Exploit-DB
SAP xMII 15.0 - Directory Traversal2016-05-17

🕵️Threat Intelligence

2
Zscaler
Zscaler found Multiple Security Vulnerabilities | 07-21-2015
Zscaler
Zscaler found IE & MS Office Vulnerabilities | 07-14-2015
CVE-2015-2389 — Microsoft vulnerability | cvebase