Microsoft Internet Explorer EditWith Broker API Sandbox Escape Vulnerability allows remote code execution in Protected Mode or Enhanced Protected Mode. Requires user interaction to visit a malicious page or open a malicious file. EditWith function flaw in the document broker can induce a race condition to execute arbitrary executables at medium integrity
Reporter | Title | Published | Views | Family All 11 |
---|---|---|---|---|
Check Point Advisories | Microsoft Internet Explorer Information Disclosure (MS15-065: CVE-2015-2402) | 14 Jul 201500:00 | – | checkpoint_advisories |
Symantec | Microsoft Internet Explorer CVE-2015-2402 Privilege Escalation Vulnerability | 14 Jul 201500:00 | – | symantec |
Cvelist | CVE-2015-2402 | 14 Jul 201521:00 | – | cvelist |
Prion | Privilege escalation | 14 Jul 201521:59 | – | prion |
NVD | CVE-2015-2402 | 14 Jul 201521:59 | – | nvd |
CVE | CVE-2015-2402 | 14 Jul 201521:59 | – | cve |
Tenable Nessus | MS15-065: Cumulative Security Update for Internet Explorer (3076321) | 15 Jul 201500:00 | – | nessus |
OpenVAS | Microsoft Internet Explorer Multiple Memory Corruption Vulnerabilities (3076321) | 15 Jul 201500:00 | – | openvas |
Microsoft KB | MS15-065: Security update for Internet Explorer: July 14, 2015 | 14 Jul 201500:00 | – | mskb |
Kaspersky | KLA10634 Multiple vulnerabilities in Microsoft Internet Explorer | 14 Jul 201500:00 | – | kaspersky |
Source | Link |
---|---|
technet | www.technet.microsoft.com/en-us/library/security/ms15-065.aspx |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo