Vulnerability & Exploit Database

Displaying entries 91 - 100 of 134058 in total

Microsoft CVE-2018-8287: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same u...

Microsoft CVE-2018-8286: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-8284: .NET Framework Remote Code Injection Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users who...

Microsoft CVE-2018-8282: Win32k Elevation of Privilege Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with ful...

Microsoft CVE-2018-8281: Microsoft Office Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could t...

Microsoft CVE-2018-8280: Chakra Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain th...

Microsoft CVE-2018-8279: Microsoft Edge Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the...

Microsoft CVE-2018-8278: Microsoft Edge Spoofing Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content. An attacker who successfully exploited this vulnerability could trick a user into believing that the user was on a legitimate website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vul...

Microsoft CVE-2018-8276: Scripting Engine Security Feature Bypass Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A security feature bypass vulnerability exists in the Microsoft Chakra scripting engine that allows Control Flow Guard (CFG) to be bypassed. By itself, the CFG bypass vulnerability does not allow arbitrary code execution. However, an attacker could use the CFG bypass vulnerability in conjunction with another vulnerability, such as a remo...

Microsoft CVE-2018-8275: Microsoft Edge Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: July 10, 2018

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the...