This update resolves several vulnerabilities found in versions 6 to 11 of Internet Explorer. When an attacker successfully exploits these vulnerabilities, it may lead to any of the following:
Attackers looking to exploit these vulnerabilities may create a number of ways to successfully use these vulnerabilities. Most likely, an attacker can create a malicious site that hosts the exploit. When a computer with the vulnerable Internet Explorer accesses this site and certain vulnerability conditions are met, the attacker may successfully exploit the vulnerable software.