Beschreibung
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely to obtain sensitive information.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in VBScript can be exploited remotely via specially crafted website to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2020-0811
- CVE-2020-0812
- CVE-2020-0813
- CVE-2020-0816
- CVE-2020-0828
- CVE-2020-0832
- CVE-2020-0833
- CVE-2020-0830
- CVE-2020-0831
- CVE-2020-0825
- CVE-2020-0824
- CVE-2020-0768
- CVE-2020-0826
- CVE-2020-0847
- CVE-2020-0827
- CVE-2020-0848
- CVE-2020-0823
Ausnutzung
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Betroffene Produkte
CVE Liste
- CVE-2020-0829 critical
- CVE-2020-0811 critical
- CVE-2020-0812 critical
- CVE-2020-0813 critical
- CVE-2020-0816 critical
- CVE-2020-0828 critical
- CVE-2020-0832 critical
- CVE-2020-0833 critical
- CVE-2020-0830 critical
- CVE-2020-0831 critical
- CVE-2020-0825 critical
- CVE-2020-0824 critical
- CVE-2020-0768 critical
- CVE-2020-0826 critical
- CVE-2020-0847 critical
- CVE-2020-0827 critical
- CVE-2020-0848 critical
- CVE-2020-0823 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!