Microsoft Internet Explorer Code Execution Vulnerabilities
The information has been provided by s3tm3m, working with HP’s Zero Day Initiative .
* Microsoft Internet Explorer 6 through 11
* Microsoft Internet Explorer after 11
Microsoft Internet Explorer could allow a remote attacker to execute arbitrary code on the system, caused by improperly accessing an object in memory. By persuading a victim to visit a specially-crafted Web site, an attacker could exploit this vulnerability to corrupt memory and execute arbitrary code on the system with the privileges of the victim.
Original release date: 11/11/2014
Last revised: 12/31/2014