Descripción
Multiple vulnerabilities were found in Microsoft Internet Explorer and Edge. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to gain privileges.
- A remote code execution vulnerability in VBScript can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Edge PDF can be exploited remotely via specially crafted to execute arbitrary code.
- A spoofing vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to spoof user interface.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
Notas informativas originales
- CVE-2020-1065
- CVE-2020-1062
- CVE-2020-1056
- CVE-2020-1060
- CVE-2020-1096
- CVE-2020-1059
- CVE-2020-1058
- CVE-2020-1093
- CVE-2020-1092
- CVE-2020-1035
- CVE-2020-1037
Explotación
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
Lista CVE
- CVE-2020-1064 critical
- CVE-2020-1065 critical
- CVE-2020-1062 critical
- CVE-2020-1056 high
- CVE-2020-1060 critical
- CVE-2020-1096 critical
- CVE-2020-1059 warning
- CVE-2020-1058 critical
- CVE-2020-1093 critical
- CVE-2020-1092 critical
- CVE-2020-1035 critical
- CVE-2020-1037 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!