vulnerability
Microsoft Windows: CVE-2018-0978: Internet Explorer Memory Corruption Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | Jun 12, 2018 | Jun 12, 2018 | Sep 10, 2025 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Jun 12, 2018
Added
Jun 12, 2018
Modified
Sep 10, 2025
Description
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8249.
Solutions
microsoft-windows-windows_10-1507-kb4284860microsoft-windows-windows_10-1607-kb4284880microsoft-windows-windows_10-1703-kb4284874microsoft-windows-windows_10-1709-kb4284819microsoft-windows-windows_10-1803-kb4284835microsoft-windows-windows_server_2016-1607-kb4284880msft-kb4230450-295ef12b-3969-43d6-863d-d57251a4d8c4msft-kb4230450-2a867b0d-ac7d-4ff7-9c95-bff9558f916amsft-kb4230450-2e127a1e-e3cd-41c0-8744-3968e0bd015fmsft-kb4230450-405b8323-5d32-4b6e-bd07-fd603a9430d6msft-kb4230450-42067eb8-52c3-4d58-9e23-7a5304d523f8msft-kb4230450-88bef693-4994-4c67-bb73-a8e655f4a77cmsft-kb4230450-89bac710-0e2a-41ac-970b-129891182949msft-kb4230450-8d834a97-7660-41ca-b124-3cd594ca0020msft-kb4230450-a772d2e1-8bb4-4bb4-8b26-a15947a9d55amsft-kb4230450-d6d4ac4d-b516-48e0-91e5-f9ddec37c2bbmsft-kb4230450-f303ee2c-7044-484d-b69d-5b2f2457ba25msft-kb4230450-f5808dfe-9e64-45d0-b337-38c45dda2377
References
- BID-104364
- CVE-2018-0978
- https://attackerkb.com/topics/CVE-2018-0978
- CWE-787
- URL-https://support.microsoft.com/help/4230450
- URL-https://support.microsoft.com/help/4284819
- URL-https://support.microsoft.com/help/4284835
- URL-https://support.microsoft.com/help/4284860
- URL-https://support.microsoft.com/help/4284874
- URL-https://support.microsoft.com/help/4284880
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.