Description
Multiple vulnerabilities were found in Microsoft Browser. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely to obtain sensitive information.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in VBScript can be exploited remotely via specially crafted website to execute arbitrary code.
Fiches de renseignement originales
- CVE-2020-0811
- CVE-2020-0812
- CVE-2020-0813
- CVE-2020-0816
- CVE-2020-0828
- CVE-2020-0832
- CVE-2020-0833
- CVE-2020-0830
- CVE-2020-0831
- CVE-2020-0825
- CVE-2020-0824
- CVE-2020-0768
- CVE-2020-0826
- CVE-2020-0847
- CVE-2020-0827
- CVE-2020-0848
- CVE-2020-0823
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
Liste CVE
- CVE-2020-0829 critical
- CVE-2020-0811 critical
- CVE-2020-0812 critical
- CVE-2020-0813 critical
- CVE-2020-0816 critical
- CVE-2020-0828 critical
- CVE-2020-0832 critical
- CVE-2020-0833 critical
- CVE-2020-0830 critical
- CVE-2020-0831 critical
- CVE-2020-0825 critical
- CVE-2020-0824 critical
- CVE-2020-0768 critical
- CVE-2020-0826 critical
- CVE-2020-0847 critical
- CVE-2020-0827 critical
- CVE-2020-0848 critical
- CVE-2020-0823 critical
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !