Beschreibung
Multiple serious vulnerabilities have been found in Microsoft browsers. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- An improper memory objects handling can be exploited via a specially designed content to execute arbitrary code;
- Lack of ports restrictions can be exploited remotely via a specially designed content to trick user into connecting to the remote system;
- Multiple memory corruption vulnerabilities can be exploited remotely via a specially designed content to execute arbitrary code;
- An improper user-specific conditions validation at XSS Filter can be exploited remotely via a specially designed content to obtain sensitive information;
- Lack of HTTP content restrictions can be exploited remotely via a specially designed content to spoof user interface.
Ursprüngliche Informationshinweise
- CVE-2016-3248
- CVE-2016-3259
- CVE-2016-3260
- CVE-2016-3261
- CVE-2016-3264
- CVE-2016-3265
- CVE-2016-3269
- CVE-2016-3271
- CVE-2016-3273
- CVE-2016-3274
- CVE-2016-3276
- CVE-2016-3277
- CVE-2016-3240
- CVE-2016-3241
- CVE-2016-3242
- CVE-2016-3243
- CVE-2016-3244
- CVE-2016-3245
- CVE-2016-3246
CVE Liste
- CVE-2016-3204 high
- CVE-2016-3248 high
- CVE-2016-3259 high
- CVE-2016-3260 high
- CVE-2016-3261 high
- CVE-2016-3264 high
- CVE-2016-3265 high
- CVE-2016-3269 high
- CVE-2016-3271 high
- CVE-2016-3273 high
- CVE-2016-3274 high
- CVE-2016-3276 high
- CVE-2016-3277 high
- CVE-2016-3240 high
- CVE-2016-3241 high
- CVE-2016-3242 high
- CVE-2016-3243 high
- CVE-2016-3244 high
- CVE-2016-3245 high
- CVE-2016-3246 high
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!