Description
Multiple vulnerabilities were found in Microsoft Internet Explorer and Edge. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to gain privileges.
- A remote code execution vulnerability in VBScript can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Edge PDF can be exploited remotely via specially crafted to execute arbitrary code.
- A spoofing vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to spoof user interface.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
Original advisories
- CVE-2020-1065
- CVE-2020-1062
- CVE-2020-1056
- CVE-2020-1060
- CVE-2020-1096
- CVE-2020-1059
- CVE-2020-1058
- CVE-2020-1093
- CVE-2020-1092
- CVE-2020-1035
- CVE-2020-1037
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2020-1064 critical
- CVE-2020-1065 critical
- CVE-2020-1062 critical
- CVE-2020-1056 high
- CVE-2020-1060 critical
- CVE-2020-1096 critical
- CVE-2020-1059 warning
- CVE-2020-1058 critical
- CVE-2020-1093 critical
- CVE-2020-1092 critical
- CVE-2020-1035 critical
- CVE-2020-1037 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!