Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Edge. Malicious users can exploit these vulnerabilities to bypass security restrictions, perform privilege escalation, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- An improper validation at Content Security Policy can be exploited remotely via a specially designed content to bypass security restrictions;
- An improper memory objects handling at Chakra JavaScript engine can be exploited remotely via a specially designed content to execute arbitrary code;
- An improper PDF parsing can be exploited remotely via a specially designed pdf document to obtain sensitive information or execute arbitrary code;
- A vulnerability in Web Proxy Auto Discovery (WPAD) protocol can be exploited remotely to bypass security restrictions and perform privilege escalation;
- A vulnerability in XSS Filter can be exploited remotely to perform a universal cross-site scripting attack;
- Internet Explorer Memory Corruption Vulnerability can be exploited remotely via a specially designed content to execute arbitrary code and perform privilege escalation;
- Scripting Engine Memory Corruption Vulnerability can be exploited remotely via a specially designed content to execute arbitrary code and perform privilege escalation;
Ursprüngliche Informationshinweise
- CVE-2016-3206
- CVE-2016-3205
- CVE-2016-3215
- CVE-2016-3214
- CVE-2016-3213
- CVE-2016-3212
- CVE-2016-3211
- CVE-2016-3210
- CVE-2016-3203
- CVE-2016-3202
- CVE-2016-3201
- CVE-2016-3199
- CVE-2016-3198
- CVE-2016-0199
- CVE-2016-0200
- CVE-2016-3222
CVE Liste
- CVE-2016-3207 high
- CVE-2016-3206 high
- CVE-2016-3205 high
- CVE-2016-3215 high
- CVE-2016-3214 high
- CVE-2016-3213 high
- CVE-2016-3212 high
- CVE-2016-3211 high
- CVE-2016-3210 high
- CVE-2016-3203 high
- CVE-2016-3202 high
- CVE-2016-3201 high
- CVE-2016-3199 high
- CVE-2016-3198 high
- CVE-2016-0199 high
- CVE-2016-0200 high
- CVE-2016-3222 high
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!