vulnerability
Microsoft Windows: CVE-2018-1022: Scripting Engine Memory Corruption Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | May 8, 2018 | May 8, 2018 | Sep 10, 2025 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
May 8, 2018
Added
May 8, 2018
Modified
Sep 10, 2025
Description
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Solutions
microsoft-windows-windows_10-1507-kb4103716microsoft-windows-windows_10-1607-kb4103723microsoft-windows-windows_10-1703-kb4103731microsoft-windows-windows_10-1709-kb4103727microsoft-windows-windows_10-1803-kb4103721microsoft-windows-windows_server_2016-1607-kb4103723msft-kb4103768-3d089cf0-cd9e-4022-a947-56388c8d296bmsft-kb4103768-52e8437a-cde8-496d-a5d0-8cba94feb7b8msft-kb4103768-67fdf8a0-07a0-49a8-b641-5f1bb0641629msft-kb4103768-82276c89-f98c-4231-99dc-84275fb5ea7bmsft-kb4103768-8bdc279b-231a-48de-92f1-6027f441d92bmsft-kb4103768-9bce7cfb-3eb0-4522-aa53-2775747d2fabmsft-kb4103768-9dd12bb1-4ef4-4db2-9012-42de3bbec6d5msft-kb4103768-d2715e4d-ba4d-441f-8197-6c67b0d857abmsft-kb4103768-e2877951-4110-4302-81b1-b567d6cb7b54msft-kb4103768-f3f4c660-ff91-4692-a3de-4447808df520
References
- BID-103978
- CVE-2018-1022
- https://attackerkb.com/topics/CVE-2018-1022
- CWE-787
- URL-https://support.microsoft.com/help/4103716
- URL-https://support.microsoft.com/help/4103721
- URL-https://support.microsoft.com/help/4103723
- URL-https://support.microsoft.com/help/4103727
- URL-https://support.microsoft.com/help/4103731
- URL-https://support.microsoft.com/help/4103768
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.