Vulnerability & Exploit Database

Displaying entries 1 - 10 of 124349 in total

Microsoft CVE-2017-11893: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...

Microsoft CVE-2017-11936: Microsoft SharePoint Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully explo...

Microsoft CVE-2017-11905: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...

Microsoft CVE-2017-11895: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same u...

Microsoft CVE-2017-11913: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the c...

Microsoft CVE-2017-11919: Scripting Engine Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft browsers. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. In a web-based attack scenario, an attacker could host a website in an attemp...

Microsoft CVE-2017-11909: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same ...

Microsoft CVE-2017-11885: Windows RRAS Service Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

A remote code execution vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could execute code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vu...

Microsoft CVE-2017-11887: Scripting Engine Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: December 11, 2017

An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, in a web-based attack scenario, an attacker could host a website in an attempt...