Description
Multiple serious vulnerabilities have been found in Microsoft browsers. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code or obtain sensitive information.
Below is a complete list of vulnerabilities
- An improper memory objects handling can be exploited via a specially designed content to execute arbitrary code;
- Lack of ports restrictions can be exploited remotely via a specially designed content to trick user into connecting to the remote system;
- Multiple memory corruption vulnerabilities can be exploited remotely via a specially designed content to execute arbitrary code;
- An improper user-specific conditions validation at XSS Filter can be exploited remotely via a specially designed content to obtain sensitive information;
- Lack of HTTP content restrictions can be exploited remotely via a specially designed content to spoof user interface.
Original advisories
- CVE-2016-3248
- CVE-2016-3259
- CVE-2016-3260
- CVE-2016-3261
- CVE-2016-3264
- CVE-2016-3265
- CVE-2016-3269
- CVE-2016-3271
- CVE-2016-3273
- CVE-2016-3274
- CVE-2016-3276
- CVE-2016-3277
- CVE-2016-3240
- CVE-2016-3241
- CVE-2016-3242
- CVE-2016-3243
- CVE-2016-3244
- CVE-2016-3245
- CVE-2016-3246
Related products
CVE list
- CVE-2016-3204 critical
- CVE-2016-3248 critical
- CVE-2016-3259 critical
- CVE-2016-3260 critical
- CVE-2016-3261 warning
- CVE-2016-3264 critical
- CVE-2016-3265 critical
- CVE-2016-3269 critical
- CVE-2016-3271 warning
- CVE-2016-3273 warning
- CVE-2016-3274 warning
- CVE-2016-3276 warning
- CVE-2016-3277 warning
- CVE-2016-3240 critical
- CVE-2016-3241 critical
- CVE-2016-3242 critical
- CVE-2016-3243 critical
- CVE-2016-3244 warning
- CVE-2016-3245 warning
- CVE-2016-3246 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!