CVE Published: 09/09/2015 |
CVE Updated: 06/08/2024 |
CVE Year: 2015 Source: microsoft |
Vendor: n/a |
Product: n/a Status : PUBLISHED
CVE-2015-2484 Description
Microsoft Internet Explorer 10 and 11 uses an incorrect flag during certain filesystem accesses, which allows remote attackers to delete arbitrary files via unspecified vectors, aka "Tampering Vulnerability."