- Threat Encyclopedia
- Vulnerability
- November 2015 – Microsoft Releases 12 Security Advisories
Trend Micro Deep Security shields networks through the following Deep Packet Inspection (DPI) rules. Trend Micro customers using the Vulnerability Protection product or OfficeScan with Intrusion Defense Firewall (IDF) plugin are also protected from attacks using these vulnerabilities.
MS Bulletin ID | Vulnerability ID | DPI Rule Number | DPI Rule Name | Release Date | Vulnerability Protection and IDF Compatibility |
MS15-112 | CVE-2015-6081 | 1007153 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6081) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6082 | 1007154 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6082) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6072 | 1007145 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6072) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6080 | 1007152 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6080) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6087 | 1007157 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6087) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6086 | 1007177 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6086) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6071 | 1007144 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6071) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6077 | 1007149 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6077) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6084 | 1007155 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6084) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6070 | 1007143 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6070) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6079 | 1007151 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6079) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6076 | 1007148 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6076) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6066 | 1007141 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6066) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6085 | 1007156 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6085) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6065 | 1007140 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6065) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6075 | 1007147 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6075) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6068 | 1007142 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6068) | 11-Nov-15 | YES |
MS15-112 | CVE-2015-6089 | 1007158 | Microsoft Internet Explorer Scripting Engine Memory Corruption Vulnerability (CVE-2015-6089) | 11-Nov-15 | YES |
MS15-112, MS15-113 | CVE-2015-6078 | 1007150 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6078) | 11-Nov-15 | YES |
MS15-112, MS15-113 | CVE-2015-6064 | 1007139 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6064) | 11-Nov-15 | YES |
MS15-112, MS15-113 | CVE-2015-6088 | 1007180 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6088) | 11-Nov-15 | YES |
MS15-112, MS15-113 | CVE-2015-6073 | 1007146 | Microsoft Internet Explorer Memory Corruption Vulnerability (CVE-2015-6073) | 11-Nov-15 | YES |
MS15-114 | CVE-2015-6097 | 1007159 | Microsoft Windows Journal Heap Overflow Vulnerability (CVE-2015-6097) | 11-Nov-15 | YES |
MS15-115 | CVE-2015-6103 | 1007160 | Microsoft Windows Graphics Memory Remote Code Execution Vulnerability (CVE-2015-6103) | 11-Nov-15 | YES |
MS15-115 | CVE-2015-6104 | 1007161 | Microsoft Windows Graphics Memory Remote Code Execution Vulnerability (CVE-2015-6104) | 11-Nov-15 | YES |
MS15-116 | CVE-2015-6094 | 1007169 | Microsoft Office Memory Corruption Vulnerability (CVE-2015-6094) | 11-Nov-15 | YES |
MS15-116 | CVE-2015-6092 | 1007168 | Microsoft Office Memory Corruption Vulnerability (CVE-2015-6092) | 11-Nov-15 | YES |
MS15-116 | CVE-2015-6038 | 1007166 | Microsoft Office Memory Corruption Vulnerability (CVE-2015-6038) | 11-Nov-15 | YES |
MS15-116 | CVE-2015-6093 | 1007183 | Microsoft Office Memory Corruption Vulnerability (CVE-2015-6093) | 11-Nov-15 | YES |
MS15-116 | CVE-2015-6091 | 1007167 | Microsoft Office Memory Corruption Vulnerability (CVE-2015-6091) | 11-Nov-15 | YES |