![]() ![]() Modifying how Internet Explorer, VBScript, and certain functions handle objects in memory.The security update addresses the vulnerabilities by: For more information, see the Affected Software section. This security update is rated Critical for Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 7 (IE 7), Internet Explorer 8 (IE 8), Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. An attacker who successfully exploited the vulnerabilities could gain the same user rights as the current user. ![]() The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer. This security update resolves vulnerabilities in Internet Explorer. Published: Decem| Updated: December 16, 2015 In this article Cumulative Security Update for Internet Explorer (3116180)
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |