CVE-2015-2484

Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary files via unspecified vectors, aka "Tampering Vulnerability."
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:internet_explorer:11:-:*:*:*:*:*:*

History

21 Nov 2024, 02:27

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/76586 - () http://www.securityfocus.com/bid/76586 -
References () http://www.securitytracker.com/id/1033487 - () http://www.securitytracker.com/id/1033487 -
References () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-094 - () https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-094 -

Information

Published : 2015-09-09 00:59

Updated : 2024-11-21 02:27


NVD link : CVE-2015-2484

Mitre link : CVE-2015-2484

CVE.ORG link : CVE-2015-2484


JSON object : View

Products Affected

microsoft

  • internet_explorer
CWE
CWE-264

Permissions, Privileges, and Access Controls