Executive Summary

Informations
Name CVE-2015-6045 First vendor Publication 2015-11-12
Vendor Cve Last vendor Modification 2018-10-12

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Cvss Base Score 9.3 Attack Range Network
Cvss Impact Score 10 Attack Complexity Medium
Cvss Expoit Score 8.6 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Use-after-free vulnerability in the CElement object implementation in Microsoft Internet Explorer 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted JavaScript that improperly interacts with use of the Cascading Style Sheets (CSS) empty-cells property for a TABLE element, aka "Internet Explorer Memory Corruption Vulnerability."

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-6045

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 1

Snort® IPS/IDS

Date Description
2017-07-04 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43072 - Revision : 1 - Type : BROWSER-IE
2017-07-04 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43071 - Revision : 1 - Type : BROWSER-IE
2017-07-04 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43070 - Revision : 1 - Type : BROWSER-IE
2017-07-04 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 43069 - Revision : 1 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer arraybuffer entryslice memory corruption attempt
RuleID : 36560 - Revision : 5 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer arraybuffer entryslice memory corruption attempt
RuleID : 36559 - Revision : 5 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 36459 - Revision : 3 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 36458 - Revision : 3 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer RegExp object use after free attempt
RuleID : 36451 - Revision : 5 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer RegExp object use after free attempt
RuleID : 36450 - Revision : 5 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer CSharedStyle object out-of-bounds read attempt
RuleID : 36448 - Revision : 3 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer CSharedStyle object out-of-bounds read attempt
RuleID : 36447 - Revision : 3 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer EventListener use after free attempt
RuleID : 36444 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer EventListener use after free attempt
RuleID : 36443 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Visual Basic scripting engine Filter argument mishandling attempt
RuleID : 36442 - Revision : 2 - Type : FILE-OTHER
2016-03-14 Visual Basic scripting engine Filter argument mishandling attempt
RuleID : 36441 - Revision : 2 - Type : FILE-OTHER
2016-03-14 Microsoft Internet Explorer CTableSelection use-after-free attempt
RuleID : 36440 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer CTableSelection use-after-free attempt
RuleID : 36439 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer ieframe.dll ActiveX clsid access
RuleID : 36438 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer ieframe.dll ActiveX clsid access
RuleID : 36437 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer arraybuffer entryslice memory corruption attempt
RuleID : 36432 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer arraybuffer entryslice memory corruption attempt
RuleID : 36431 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36422 - Revision : 2 - Type : POLICY-OTHER
2016-03-14 Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36421 - Revision : 2 - Type : POLICY-OTHER
2016-03-14 Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36420 - Revision : 2 - Type : POLICY-OTHER
2016-03-14 Remote non-VBScript file found in Visual Basic script tag src attribute
RuleID : 36419 - Revision : 2 - Type : POLICY-OTHER
2016-03-14 Microsoft Internet Explorer CWindow object use after free attempt
RuleID : 36418 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer CWindow object use after free attempt
RuleID : 36417 - Revision : 2 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer sandbox escape attempt
RuleID : 36414 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer sandbox escape attempt
RuleID : 36413 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer sandbox escape attempt
RuleID : 36412 - Revision : 4 - Type : BROWSER-IE
2016-03-14 Microsoft Internet Explorer sandbox escape attempt
RuleID : 36411 - Revision : 4 - Type : BROWSER-IE
2016-03-14 RDP client dll-load exploit attempt
RuleID : 36410 - Revision : 4 - Type : OS-WINDOWS
2016-03-14 RDP client dll-load exploit attempt
RuleID : 36409 - Revision : 4 - Type : OS-WINDOWS
2016-03-14 RDP client dll-load exploit attempt
RuleID : 36408 - Revision : 4 - Type : OS-WINDOWS
2016-03-14 RDP client dll-load exploit attempt
RuleID : 36407 - Revision : 4 - Type : OS-WINDOWS
2015-06-17 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 34394 - Revision : 4 - Type : BROWSER-IE
2015-06-17 Microsoft Internet Explorer vbscript regular expression information disclosur...
RuleID : 34393 - Revision : 4 - Type : BROWSER-IE

Nessus® Vulnerability Scanner

Date Description
2015-10-13 Name : The remote host is affected by multiple vulnerabilities.
File : smb_nt_ms15-106.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
MISC http://www.zerodayinitiative.com/advisories/ZDI-15-523
http://www.zerodayinitiative.com/advisories/ZDI-15-523/
MS https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15...

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
Date Informations
2021-05-04 12:41:23
  • Multiple Updates
2021-04-22 01:50:17
  • Multiple Updates
2020-05-23 00:46:22
  • Multiple Updates
2018-10-13 05:18:57
  • Multiple Updates
2016-12-07 21:24:44
  • Multiple Updates
2015-11-13 21:24:23
  • Multiple Updates
2015-11-13 09:25:35
  • First insertion