Vulnerability & Exploit Database

Displaying entries 61 - 70 of 135096 in total

Microsoft CVE-2018-8398: Windows GDI Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincin...

Microsoft CVE-2018-8397: GDI+ Remote Code Execution Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with ful...

Microsoft CVE-2018-8396: Windows GDI Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincin...

Microsoft CVE-2018-8394: Windows GDI Information Disclosure Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincin...

Microsoft CVE-2018-8390: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user ri...

Microsoft CVE-2018-8389: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the sa...

Microsoft CVE-2018-8388: Microsoft Edge Spoofing Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content. An attacker who successfully exploited this vulnerability could trick a user into believing that the user was on a legitimate website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vul...

Microsoft CVE-2018-8387: Microsoft Edge Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the...

Microsoft CVE-2018-8385: Scripting Engine Memory Corruption Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same u...

Microsoft CVE-2018-8383: Microsoft Edge Spoofing Vulnerability Vulnerability

  • Severity: 4
  • Published: August 14, 2018

A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content. An attacker who successfully exploited this vulnerability could trick a user by redirecting the user to a specially crafted website. The specially crafted website could either spoof content or serve as a pivot to chain an attack with other vulnerabi...