9.3
CVSSv2

CVE-2015-2419

Published: 14/07/2015 Updated: 12/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

JScript 9 in Microsoft Internet Explorer 10 and 11 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "JScript9 Memory Corruption Vulnerability."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet explorer 10

microsoft internet explorer 11

Github Repositories

Analyzing Rig Exploit Kit

初めての Rig Exploit Kit リーディング この記事は@nao_sec(@kkrnt, @PINKSAWTOOTH)が2017-05-15に公開しました 書かれている内容について, 著者は一切の責任を負いません はじめに 私がDrive-by Download攻撃について趣味で調べ始めてから3ヶ月が経ちました それまでは攻撃の概要をぼんやりと知って

Recent Articles

Sundown exploit kit authors champions of copy-paste hacking
The Register • Darren Pauli • 05 Sep 2016

Pay peanuts, get monkeys.

Authors of the Sundown exploit kit have proven themselves masters of copy and paste, stealing exploits from rivals and borking encryption when they opt for originality. Exploit kits offer an arsenal of attacks to the unscrupulous and are popular because they offer many means to point malicious payloads at victim machines. Authors compete to build the most capable exploit kits by reverse-engineering patches to build in the latest exploits, by buying zero-day exploits on underground market or some...

IT threat evolution in Q1 2016
Securelist • Alexander Gostev Roman Unuchek Maria Garnaeva Denis Makrushin Anton Ivanov • 05 May 2016

Download PDF version 2016 has only just got underway, but the first three months have already seen the same amount of cybersecurity events that just a few years ago would have seemed normal for a whole year. The main underlying trends remained the same, while there was significant growth in trends related to traditional cybercrime, especially mobile threats and global ransomware epidemics. Ransomware became the main theme of the quarter after knocking targeted attacks from the top of the most po...

Kaspersky Security Bulletin 2015. Overall statistics for 2015
Securelist • Maria Garnaeva Jornt van der Wiel Denis Makrushin Anton Ivanov Yury Namestnikov • 15 Dec 2015

Download PDF version Download EPUB Download Full Report PDF Download Full Report EPUB In 2015, we saw the use of new techniques for masking exploits, shellcodes and payloads to make detecting infections and analyzing malicious code more difficult. Specifically, cybercriminals: The detection of two families of critical vulnerabilities for Android was one of the more remarkable events of the year. Exploiting Stagefright vulnerabilities enabled an attacker to remotely execute arbitrary code on a...

Attacking Diffie-Hellman protocol implementation in the Angler Exploit Kit
Securelist • Victor Alyushin Dmitry Vinogradov Vasily Davydov Anton Ivanov • 08 Sep 2015

Exploit kit creators have been inventing increasingly interesting methods of masking their exploits, shellcodes, and payloads so that it is harder for analysts to define the type of the exploit and know what actions they may perform. Several days ago analysts found the usage of the Diffie-Hellman cryptographic protocol in the Angler Exploit Kit, which is one of the most popular exploit kits at the moment. This protocol was developed more than 40 years ago, but that is the first known case of its...