Detect date
?
|
08/08/2017 |
Severity
?
|
Critical |
Description
|
Multiple serious vulnerabilities have been found in Microsoft Internet Explorer and Microsoft Edge. Malicious users can exploit these vulnerabilities to gain privileges, bypass security restrictions, execute arbitrary code and obtain sensitive information. Below is a complete list of vulnerabilities:
Technical details To exploit vulnerabilities (9) and (13), an attacker can send an URL to the malicious website via email or instant message. Exploit of vulnerability (12) allows attackers to get sensitive data from memory and possibly bypass ASLR (Address Space Layout Randomization). |
Affected products
|
Microsoft Internet Explorer versions 9 through 11 |
Solution
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Original advisories
|
CVE-2017-8647 |
Impacts
?
|
ACE [?] OSI [?] SB [?] PE [?] SUI [?] |
Related products
|
Microsoft Internet Explorer Microsoft Edge |
CVE-IDS
?
|
CVE-2017-85034.6Warning
CVE-2017-86256.8High CVE-2017-86347.6Critical CVE-2017-86357.6Critical CVE-2017-86367.6Critical CVE-2017-86372.6Warning CVE-2017-86387.6Critical CVE-2017-86397.6Critical CVE-2017-86407.6Critical CVE-2017-86417.6Critical CVE-2017-86424.3Warning CVE-2017-86444.3Warning CVE-2017-86457.6Critical CVE-2017-86467.6Critical CVE-2017-86477.6Critical CVE-2017-86505.8High CVE-2017-86517.6Critical CVE-2017-86524.3Warning CVE-2017-86537.6Critical CVE-2017-86557.6Critical CVE-2017-86567.6Critical CVE-2017-86577.6Critical CVE-2017-86594.3Warning CVE-2017-86617.6Critical CVE-2017-86624.3Warning CVE-2017-86697.6Critical CVE-2017-86707.6Critical CVE-2017-86717.6Critical CVE-2017-86727.6Critical CVE-2017-86747.6Critical |
Microsoft official advisories
|
Microsoft Security Update Guide |
KB list
|
|
Exploitation
|
Public exploits exist for this vulnerability. Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Find out the statistics of the vulnerabilities spreading in your region |