CVE-2015-2484Microsoft Internet Explorer vulnerability

CWE-2644 documents4 sources
Severity
6.4MEDIUMNVD
EPSS
21.0%
top 4.35%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 9
Latest updateMay 14

Description

Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary files via unspecified vectors, aka "Tampering Vulnerability."

CVSS vector

AV:N/AC:L/C:N/I:P/A:PExploitability: 10.0 | Impact: 4.9

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-c4v2-w5g7-g3r4: Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary fil2022-05-14
CVEList
CVE-2015-2484: Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary fil2015-09-09

🕵️Threat Intelligence

1
Zscaler
Zscaler detects IE & MS Office Vulnerabilities | 09-09-2015
CVE-2015-2484 — Microsoft vulnerability | cvebase