Description
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Internet Explorer can be exploited remotely via specially crafted content to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Edge based on Edge HTML can be exploited remotely via specially crafted content to obtain sensitive information.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2017-11811
- CVE-2017-11812
- CVE-2017-11813
- CVE-2017-11790
- CVE-2017-11792
- CVE-2017-11793
- CVE-2017-11794
- CVE-2017-11796
- CVE-2017-11798
- CVE-2017-11800
- CVE-2017-11805
- CVE-2017-11808
- CVE-2017-11804
- CVE-2017-11809
- CVE-2017-11799
- CVE-2017-11822
- CVE-2017-11806
- CVE-2017-11802
- CVE-2017-11807
- CVE-2017-8726
- CVE-2017-11821
- CVE-2017-11797
- CVE-2017-11801
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2017-11797 critical
- CVE-2017-11801 critical
- CVE-2017-11810 critical
- CVE-2017-11811 critical
- CVE-2017-11812 critical
- CVE-2017-11813 critical
- CVE-2017-11790 warning
- CVE-2017-11792 critical
- CVE-2017-11793 critical
- CVE-2017-11794 warning
- CVE-2017-11796 critical
- CVE-2017-11798 critical
- CVE-2017-11800 critical
- CVE-2017-11805 critical
- CVE-2017-11808 critical
- CVE-2017-11804 critical
- CVE-2017-11809 critical
- CVE-2017-11799 critical
- CVE-2017-11822 critical
- CVE-2017-11806 critical
- CVE-2017-11802 critical
- CVE-2017-11807 critical
- CVE-2017-8726 warning
- CVE-2017-11821 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!