vulnerability
Microsoft Windows: CVE-2018-8372: Scripting Engine Memory Corruption Vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | 2018-08-14 | 2018-08-14 | 2024-09-05 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
2018-08-14
Added
2018-08-14
Modified
2024-09-05
Description
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
Solution(s)
microsoft-windows-windows_10-1507-kb4343892microsoft-windows-windows_10-1607-kb4343887microsoft-windows-windows_10-1703-kb4343885microsoft-windows-windows_10-1709-kb4343897microsoft-windows-windows_10-1803-kb4343909microsoft-windows-windows_server_2012_r2-kb4343205microsoft-windows-windows_server_2016-1607-kb4343887msft-kb4343205-0b078f93-1d60-4e71-90a7-b682d4329022msft-kb4343205-10d15f81-06cb-4693-a10a-12efd1a48129msft-kb4343205-13e8e44b-d846-4c1b-b77c-c775a3988b8amsft-kb4343205-44923d95-a1ce-429f-a7f3-46a429610b14msft-kb4343205-48b9691a-33c2-4f86-9c4a-85153012d4efmsft-kb4343205-5bc11770-dd1c-4144-94de-5d2fd2b7cbefmsft-kb4343205-7597eb71-c396-4fdb-8600-d9d1c2582152msft-kb4343205-c8052fa6-186c-41a7-a222-cc079eec1a26msft-kb4343205-d061bfd7-009e-4417-bf92-8d1d7636afdfmsft-kb4343205-d6af2c4e-ca82-4539-b40e-a18e3f8ea7e5
References
- BID-105038
- CVE-2018-8372
- https://attackerkb.com/topics/CVE-2018-8372
- URL-https://support.microsoft.com/help/4343205
- URL-https://support.microsoft.com/help/4343885
- URL-https://support.microsoft.com/help/4343887
- URL-https://support.microsoft.com/help/4343892
- URL-https://support.microsoft.com/help/4343897
- URL-https://support.microsoft.com/help/4343909

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.