Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0876, CVE-2018-0889, CVE-2018-0893, and CVE-2018-0925.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103298 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040510 | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0935 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/44404/ | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/103298 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040510 | Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0935 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/44404/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
21 Nov 2024, 03:39
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/103298 - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040510 - Third Party Advisory, VDB Entry | |
References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0935 - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/44404/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2018-03-14 17:29
Updated : 2024-11-21 03:39
NVD link : CVE-2018-0935
Mitre link : CVE-2018-0935
CVE.ORG link : CVE-2018-0935
JSON object : View
Products Affected
microsoft
- windows_8.1
- windows_10
- windows_7
- internet_explorer
- windows_rt_8.1
- windows_server_2012
- windows_server_2008
- windows_server_2016