Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Edge and Microsoft Internet Explorer. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, bypass security restrictions and spoof user interface.
Below is a complete list of vulnerabilities:
- Multiple vulnerabilities related to improper handling of objects in memory in Microsoft Edge can be exploited remotely via a specially designed website to obtain sensitive information;
- An improper handling of clipboard events in Microsoft Edge can be exploited remotely via a specially designed website to obtain sensitive information;
- An incorrect parent domain verification in Microsoft browsers can be exploited remotely via a specially designed website to obtain sensitive information;
- An incorrect handling of objects in memory in the scripting engine in Microsoft Edge can be exploited remotely via a specially designed website to obtain sensitive information;
- Multiple vulnerabilities related to incorrect handling of objects in memory in the scripting engine in Microsoft Edge can be exploited remotely via a specially designed website to execute arbitrary code;
- Multiple vulnerabilities related to improper access of objects in memory in Microsoft browsers can be exploited remotely via a specially designed website to execute arbitrary code;
- Multiple vulnerabilities related to improper handling of objects in memory in JavaScript engines in Microsoft browsers during rendering content can be exploited remotely via a specially designed website to execute arbitrary code;
- Multiple vulnerabilities related to improper validation of documents in Microsoft Edge can be exploited remotely via a specially designed website to bypass security restrictions;
- Multiple vulnerabilities related to incorrect parsing of HTTP content in Microsoft Edge can be exploited remotely via a specially designed website to spoof user interface;
- An improper handling of HTTP content in Microsoft Internet Explorer can be exploited remotely via a specially designed website to spoof user interface;
- Multiple vulnerabilities related to incorrect handling of objects in memory in Microsoft Windows PDF Library can be exploited remotely via a specially designed website to execute arbitrary code.
NB: Not every vulnerability already has CVSS rating, so cumulative CVSS rating can be not representative.
Ursprüngliche Informationshinweise
- CVE-2017-8747
- CVE-2017-8734
- CVE-2017-8729
- CVE-2017-8728
- CVE-2017-8757
- CVE-2017-8749
- CVE-2017-8738
- CVE-2017-11766
- CVE-2017-8750
- CVE-2017-8731
- CVE-2017-8753
- CVE-2017-8723
- CVE-2017-8724
- CVE-2017-8741
- CVE-2017-8754
- CVE-2017-8740
- CVE-2017-8752
- CVE-2017-8597
- CVE-2017-8660
- CVE-2017-8736
- CVE-2017-11764
- CVE-2017-8643
- CVE-2017-8751
- CVE-2017-8649
- CVE-2017-8748
- CVE-2017-8755
- CVE-2017-8737
- CVE-2017-8648
- CVE-2017-8739
- CVE-2017-8735
- CVE-2017-8733
CVE Liste
- CVE-2017-8756 high
- CVE-2017-8747 high
- CVE-2017-8734 high
- CVE-2017-8729 high
- CVE-2017-8728 high
- CVE-2017-8757 high
- CVE-2017-8749 high
- CVE-2017-8738 high
- CVE-2017-11766 high
- CVE-2017-8750 high
- CVE-2017-8731 high
- CVE-2017-8753 high
- CVE-2017-8723 high
- CVE-2017-8724 high
- CVE-2017-8741 high
- CVE-2017-8754 high
- CVE-2017-8740 high
- CVE-2017-8752 high
- CVE-2017-8597 high
- CVE-2017-8660 high
- CVE-2017-8736 high
- CVE-2017-11764 high
- CVE-2017-8643 high
- CVE-2017-8751 high
- CVE-2017-8649 high
- CVE-2017-8748 high
- CVE-2017-8755 high
- CVE-2017-8737 high
- CVE-2017-8648 high
- CVE-2017-8739 high
- CVE-2017-8735 high
- CVE-2017-8733 high
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!