vulnerability
Microsoft Windows: CVE-2017-8547: Internet Explorer Memory Corruption Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | Jun 13, 2017 | Jun 13, 2017 | Sep 10, 2025 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Jun 13, 2017
Added
Jun 13, 2017
Modified
Sep 10, 2025
Description
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 and R2 allow an attacker to execute arbitrary code in the context of the current user when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8519.
Solutions
microsoft-windows-windows_10-1507-kb4022727microsoft-windows-windows_10-1511-kb4022714microsoft-windows-windows_10-1607-kb4022715microsoft-windows-windows_10-1703-kb4022725microsoft-windows-windows_server_2016-1607-kb4022715msft-kb4021558-052612b1-6157-4bc2-9758-168f1d9bc180msft-kb4021558-1a20690c-eccc-4617-83f1-ee5aa6a920admsft-kb4021558-1aaafb63-2605-451a-9ea1-3274f3a8ab91msft-kb4021558-49b70cad-8a12-4b50-807a-eb9021fde6ffmsft-kb4021558-4e594417-8f87-44f1-89e3-845486ffff5amsft-kb4021558-83c37d81-0a45-4c57-a620-72b72221b7f1msft-kb4021558-a196ec51-acf8-407b-b0e9-8208dd862afdmsft-kb4021558-ca61d9f1-ebe8-446e-980f-95d27a2a645emsft-kb4021558-d453e981-b1c2-496a-ab5e-6e7e3a59f27amsft-kb4021558-d50a684b-0a9c-4a5d-9aaa-9cae1f829a4bmsft-kb4021558-e0d58961-72a0-46f4-95e7-723285ee8a78msft-kb4021558-ff0ae28e-4700-48c8-b867-4de5a2e9f4e6
References
- BID-98932
- CVE-2017-8547
- https://attackerkb.com/topics/CVE-2017-8547
- CWE-119
- URL-https://support.microsoft.com/help/4021558
- URL-https://support.microsoft.com/help/4022714
- URL-https://support.microsoft.com/help/4022715
- URL-https://support.microsoft.com/help/4022725
- URL-https://support.microsoft.com/help/4022727
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.