Vulnerability Name: | CVE-2015-2484 (CCN-106020) | ||||||||
Assigned: | 2015-09-08 | ||||||||
Published: | 2015-09-08 | ||||||||
Updated: | 2018-10-12 | ||||||||
Summary: | Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary files via unspecified vectors, aka "Tampering Vulnerability." | ||||||||
CVSS v3 Severity: | 4.7 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N) 4.1 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||
CVSS v2 Severity: | 6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-264 | ||||||||
Vulnerability Consequences: | File Manipulation | ||||||||
References: | Source: MITRE Type: CNA CVE-2015-2484 Source: CCN Type: Microsoft Security Bulletin MS15-094 Cumulative Security Update for Internet Explorer (3089548) Source: CCN Type: Microsoft Security Bulletin MS15-105 Vulnerability in Windows Hyper-V Could Allow Security Feature Bypass (3091287) Source: CCN Type: Microsoft Security Bulletin MS16-045 Security Update for Windows Hyper-V (3143118) Source: BID Type: UNKNOWN 76586 Source: SECTRACK Type: UNKNOWN 1033487 Source: MS Type: UNKNOWN MS15-094 Source: XF Type: UNKNOWN ms-ie-cve20152484-file-deletion(106020) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |