Description
Multiple serious vulnerabilities have been found in Microsoft Edge and Internet Explorer. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions or obtain sensitive information.
Below is a complete list of vulnerabilities
- An improper memory objects access can be exploited remotely via a specially designed content to execute arbitrary code;
- Lack of sandbox restrictions can be exploited remotely to gain privileges;
- An improper memory objects handling can be exploited remotely via a specially designed content to obtain sensitive information;
- An improper cross-origin requests handling can be exploited via a specially designed content to obtain sensitive information;
- An improper files handling can be exploited via a specially designed content to bypass security restrictions.
Original advisories
- CVE-2016-3291
- CVE-2016-3292
- CVE-2016-3294
- CVE-2016-3295
- CVE-2016-3370
- CVE-2016-3374
- CVE-2016-3324
- CVE-2016-3375
- CVE-2016-3330
- CVE-2016-3325
- CVE-2016-3297
- CVE-2016-3350
- CVE-2016-3351
- CVE-2016-3353
- CVE-2016-3377
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2016-3247 high
- CVE-2016-3291 warning
- CVE-2016-3292 high
- CVE-2016-3294 critical
- CVE-2016-3295 high
- CVE-2016-3370 warning
- CVE-2016-3374 warning
- CVE-2016-3324 high
- CVE-2016-3375 critical
- CVE-2016-3330 critical
- CVE-2016-3325 warning
- CVE-2016-3297 high
- CVE-2016-3350 critical
- CVE-2016-3351 warning
- CVE-2016-3353 high
- CVE-2016-3377 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!