Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Edge can be exploited remotely to gain privileges.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- A spoofing vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to spoof user interface.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely via specially crafted content to execute arbitrary code.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Internet Explorer can be exploited remotely via specially crafted to bypass security restrictions.
Original advisories
- CVE-2017-0241
- CVE-2017-0240
- CVE-2017-0238
- CVE-2017-0236
- CVE-2017-0235
- CVE-2017-0234
- CVE-2017-0233
- CVE-2017-0231
- CVE-2017-0230
- CVE-2017-0229
- CVE-2017-0228
- CVE-2017-0227
- CVE-2017-0226
- CVE-2017-0224
- CVE-2017-0222
- CVE-2017-0221
- CVE-2017-0064
Related products
CVE list
- CVE-2017-0266 critical
- CVE-2017-0241 high
- CVE-2017-0240 critical
- CVE-2017-0238 critical
- CVE-2017-0236 critical
- CVE-2017-0235 critical
- CVE-2017-0234 critical
- CVE-2017-0233 high
- CVE-2017-0231 warning
- CVE-2017-0230 critical
- CVE-2017-0229 critical
- CVE-2017-0228 critical
- CVE-2017-0227 critical
- CVE-2017-0226 critical
- CVE-2017-0224 critical
- CVE-2017-0222 critical
- CVE-2017-0221 critical
- CVE-2017-0064 warning
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!