vulnerability
Microsoft Windows: CVE-2017-8749: Internet Explorer Memory Corruption Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | Sep 12, 2017 | Sep 12, 2017 | Sep 10, 2025 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Sep 12, 2017
Added
Sep 12, 2017
Modified
Sep 10, 2025
Description
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to the way that Internet Explorer accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8747.
Solutions
microsoft-windows-windows_10-1507-kb4038781microsoft-windows-windows_10-1511-kb4038783microsoft-windows-windows_10-1607-kb4038782microsoft-windows-windows_10-1703-kb4038788microsoft-windows-windows_server_2016-1607-kb4038782msft-kb4036586-100d820a-34d2-4f62-ad61-872e2cbd7c4fmsft-kb4036586-37862454-020d-4287-83fb-7b61731cde8cmsft-kb4036586-3bd3cfc2-d9b7-4999-8748-918cb2cedc65msft-kb4036586-41e01fa9-a8e9-4ef5-b338-474523360c20msft-kb4036586-60c44d4c-3843-404c-8e6d-fe65a1fa430dmsft-kb4036586-81774433-674c-4eef-9622-9a06d7fd18b2msft-kb4036586-8213f752-b625-42dc-90a7-ca9c59056875msft-kb4036586-900ceb5b-e8eb-44b5-ac8e-dd449724c7d0msft-kb4036586-d16e1f54-0d9a-4d3e-b522-0dc18c7373demsft-kb4036586-dcf4e654-a636-4d3d-808c-8bc58e047e3dmsft-kb4036586-e5cf852b-0b30-4330-adea-d30604db1ec7msft-kb4036586-ee50f271-ac3a-4b80-b6d5-e08c024976ec
References
- BID-100770
- CVE-2017-8749
- https://attackerkb.com/topics/CVE-2017-8749
- CWE-119
- URL-https://support.microsoft.com/help/4036586
- URL-https://support.microsoft.com/help/4038781
- URL-https://support.microsoft.com/help/4038782
- URL-https://support.microsoft.com/help/4038783
- URL-https://support.microsoft.com/help/4038788
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.