vulnerability

Microsoft Windows: CVE-2017-0238: Microsoft Edge Memory Corruption Vulnerability

Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
May 9, 2017
Added
Jun 14, 2017
Modified
Sep 3, 2025

Description

A remote code execution vulnerability exists in Microsoft browsers in the way JavaScript scripting engines handle objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This CVE ID is unique from CVE-2017-0224, CVE-2017-0228, CVE-2017-0229, CVE-2017-0230, CVE-2017-0234, CVE-2017-0235, and CVE-2017-0236.

Solutions

microsoft-windows-windows_10-1507-kb4019474microsoft-windows-windows_10-1511-kb4019473microsoft-windows-windows_10-1607-kb4019472microsoft-windows-windows_10-1703-kb4016871msft-kb4018271-029e80a0-c3e7-476a-addc-6e2ee9272652msft-kb4018271-0a3c5e93-f2e0-4fe4-ac13-9441352d889dmsft-kb4018271-0c21eb41-41c8-4ac8-b74a-a1ac940cbd19msft-kb4018271-0faa8bb3-23ab-4ac8-a402-95bbc12436b1msft-kb4018271-2f764af7-543b-497c-ad07-3d138623d5bamsft-kb4018271-5a278124-59da-4b37-8aed-3b4b30c8e7fbmsft-kb4018271-5d605b9b-72ae-4578-91ce-dddd6bef7495msft-kb4018271-6343f284-77e8-4582-a7dd-4c75bf4142d1msft-kb4018271-665889ee-a56a-4419-b8b9-1cdafb5a3312msft-kb4018271-69f163b7-883a-485d-b619-923a0755f630msft-kb4018271-7e224737-81c5-4c04-a994-7b4d7e0149ccmsft-kb4018271-8eb29486-0deb-4e53-8f2b-285bf4fa572amsft-kb4018271-9a275ac7-f790-440d-a338-82a2c5f7185amsft-kb4018271-9a70ddbf-abb3-43b1-a967-aa75b6f220bdmsft-kb4018271-a1e888ba-0d97-4c09-a4d1-3b0e37f1c027msft-kb4018271-b2ab07b5-9772-47ae-af01-9908f62f3878msft-kb4018271-b8d7147a-0628-44ac-9bd7-f03502930148msft-kb4018271-c1712990-5efa-443a-ad6b-f9ff7d320c4dmsft-kb4018271-c37a095f-74ee-459a-b099-c51ab0cd7741msft-kb4018271-d046cb70-a1e8-4c4a-9d0e-0189fe9b17cemsft-kb4018271-dcdb7285-422f-49fd-8b02-7c857f8fbb65msft-kb4018271-de1c2774-3cb6-4519-bfab-389a84034622msft-kb4018271-e23c5f53-891d-4389-afd7-f2e8725c04cbmsft-kb4018271-e6fd0bc9-4fdb-4967-9825-cecec4c14fa0msft-kb4018271-ebee7d44-6fcc-44ac-b831-408a65b37058
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.