The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Microsoft Internet Explorer

Internet Explorer: two vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
3118753, 3124903, CERTFR-2016-AVI-010, CVE-2016-0002, CVE-2016-0005, MS16-001, VIGILANCE-VUL-18697
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
2755801, APSB16-01, CERTFR-2015-AVI-567, CVE-2015-8459, CVE-2015-8460, CVE-2015-8634, CVE-2015-8635, CVE-2015-8636, CVE-2015-8638, CVE-2015-8639, CVE-2015-8640, CVE-2015-8641, CVE-2015-8642, CVE-2015-8643, CVE-2015-8644, CVE-2015-8645, CVE-2015-8646, CVE-2015-8647, CVE-2015-8648, CVE-2015-8649, CVE-2015-8650, CVE-2015-8651, CVE-2016-0959, openSUSE-SU-2015:2400-1, openSUSE-SU-2015:2403-1, RHSA-2015:2697-01, SUSE-SU-2015:2401-1, SUSE-SU-2015:2402-1, VIGILANCE-VUL-18602, ZDI-15-648, ZDI-15-649, ZDI-15-650, ZDI-15-651, ZDI-15-652, ZDI-15-653
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
3116180, BFS-SA-2015-003, CERTFR-2015-AVI-520, CVE-2015-6083, CVE-2015-6134, CVE-2015-6135, CVE-2015-6136, CVE-2015-6138, CVE-2015-6139, CVE-2015-6140, CVE-2015-6141, CVE-2015-6142, CVE-2015-6143, CVE-2015-6144, CVE-2015-6145, CVE-2015-6146, CVE-2015-6147, CVE-2015-6148, CVE-2015-6149, CVE-2015-6150, CVE-2015-6151, CVE-2015-6152, CVE-2015-6153, CVE-2015-6154, CVE-2015-6155, CVE-2015-6156, CVE-2015-6157, CVE-2015-6158, CVE-2015-6159, CVE-2015-6160, CVE-2015-6161, CVE-2015-6162, CVE-2015-6164, MS15-124, VIGILANCE-VUL-18467, ZDI-15-582, ZDI-15-584, ZDI-15-585, ZDI-15-586, ZDI-15-587, ZDI-15-588, ZDI-15-589, ZDI-15-590, ZDI-15-591, ZDI-15-592, ZDI-15-593, ZDI-15-594, ZDI-15-595, ZDI-15-596, ZDI-15-597, ZDI-15-598, ZDI-15-599, ZDI-15-600, ZDI-15-645, ZDI-15-647
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
3104517, CERTFR-2015-AVI-469, CVE-2015-2427, CVE-2015-6064, CVE-2015-6065, CVE-2015-6066, CVE-2015-6068, CVE-2015-6069, CVE-2015-6070, CVE-2015-6071, CVE-2015-6072, CVE-2015-6073, CVE-2015-6074, CVE-2015-6075, CVE-2015-6076, CVE-2015-6077, CVE-2015-6078, CVE-2015-6079, CVE-2015-6080, CVE-2015-6081, CVE-2015-6082, CVE-2015-6084, CVE-2015-6085, CVE-2015-6086, CVE-2015-6087, CVE-2015-6088, CVE-2015-6089, MS15-112, VIGILANCE-VUL-18277, ZDI-15-538, ZDI-15-540, ZDI-15-541, ZDI-15-542, ZDI-15-544, ZDI-15-547, ZDI-16-229
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
2755801, APSB15-28, CERTFR-2015-AVI-481, CVE-2015-7651, CVE-2015-7652, CVE-2015-7653, CVE-2015-7654, CVE-2015-7655, CVE-2015-7656, CVE-2015-7657, CVE-2015-7658, CVE-2015-7659, CVE-2015-7660, CVE-2015-7661, CVE-2015-7662, CVE-2015-7663, CVE-2015-8042, CVE-2015-8043, CVE-2015-8044, CVE-2015-8046, openSUSE-SU-2015:1984-1, RHSA-2015:2023-01, RHSA-2015:2024-01, VIGILANCE-VUL-18276, ZDI-15-556, ZDI-15-557, ZDI-15-558, ZDI-15-559, ZDI-15-560, ZDI-15-561, ZDI-15-562, ZDI-15-563, ZDI-15-564, ZDI-15-565, ZDI-15-566, ZDI-15-567
Adobe Flash Player: three vulnerabilities
An attacker can invite the victim to visit a malicious site, calling Adobe Flash Player, in order to run code...
2755801, APSA15-05, APSB15-27, CERTFR-2015-ALE-011-001, CERTFR-2015-AVI-434, CERTFR-2015-AVI-448, CVE-2015-7645, CVE-2015-7647, CVE-2015-7648, openSUSE-SU-2015:1768-1, openSUSE-SU-2015:1781-1, RHSA-2015:1913-01, RHSA-2015:2024-01, SUSE-SU-2015:1770-1, SUSE-SU-2015:1771-1, VIGILANCE-VUL-18111
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
2755801, APSB15-25, CERTFR-2015-AVI-428, CVE-2015-5569, CVE-2015-7625, CVE-2015-7626, CVE-2015-7627, CVE-2015-7628, CVE-2015-7629, CVE-2015-7630, CVE-2015-7631, CVE-2015-7632, CVE-2015-7633, CVE-2015-7634, CVE-2015-7635, CVE-2015-7636, CVE-2015-7637, CVE-2015-7638, CVE-2015-7639, CVE-2015-7640, CVE-2015-7641, CVE-2015-7642, CVE-2015-7643, CVE-2015-7644, openSUSE-SU-2015:1744-1, openSUSE-SU-2015:1781-1, RHSA-2015:1893-01, RHSA-2015:2024-01, SUSE-SU-2015:1740-1, SUSE-SU-2015:1742-1, VIGILANCE-VUL-18085, ZDI-15-511, ZDI-15-512, ZDI-15-513, ZDI-15-514
HTTPS: Cookie injection
An attacker can inject a cookie in an HTTPS (HTTP+TLS) session, in order to alter the behavior of the web service, if it is not conceived to receive unexpected cookies...
VIGILANCE-VUL-17985, VU#804060
Adobe Flash Player: multiple vulnerabilities
An attacker can use several vulnerabilities of Adobe Flash Player...
2755801, 451, APSB15-23, CERTFR-2015-AVI-404, CVE-2015-5567, CVE-2015-5568, CVE-2015-5570, CVE-2015-5571, CVE-2015-5572, CVE-2015-5573, CVE-2015-5574, CVE-2015-5575, CVE-2015-5576, CVE-2015-5577, CVE-2015-5578, CVE-2015-5579, CVE-2015-5580, CVE-2015-5581, CVE-2015-5582, CVE-2015-5584, CVE-2015-5587, CVE-2015-5588, CVE-2015-6676, CVE-2015-6677, CVE-2015-6678, CVE-2015-6679, CVE-2015-6682, openSUSE-SU-2015:1616-1, openSUSE-SU-2015:1781-1, RHSA-2015:1814-01, SUSE-SU-2015:1614-1, SUSE-SU-2015:1618-1, VIGILANCE-VUL-17945, ZDI-15-446, ZDI-15-447
Internet Explorer: multiple vulnerabilities
An attacker can use several vulnerabilities of Internet Explorer...
3089548, CERTFR-2015-AVI-383, CVE-2015-2483, CVE-2015-2484, CVE-2015-2485, CVE-2015-2486, CVE-2015-2487, CVE-2015-2489, CVE-2015-2490, CVE-2015-2491, CVE-2015-2492, CVE-2015-2493, CVE-2015-2494, CVE-2015-2498, CVE-2015-2499, CVE-2015-2500, CVE-2015-2501, CVE-2015-2541, CVE-2015-2542, MS15-094, VIGILANCE-VUL-17840, ZDI-15-420, ZDI-15-421, ZDI-15-422, ZDI-15-423, ZDI-15-424, ZDI-15-425, ZDI-15-426, ZDI-15-427, ZDI-15-428
Our database contains other pages. You can request a free trial to read them.

Display information about Microsoft Internet Explorer: