CVE-2017-0202
EUVD-2017-056912.04.2017, 14:59
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, a.k.a. "Internet Explorer Memory Corruption Vulnerability."Enginsight
Awaiting analysis
This vulnerability is currently awaiting analysis.
Windows Releases
Platform | Version | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Windows 10 |
| ||||||||
| Windows 7 |
| ||||||||
| Windows 8.1 |
| ||||||||
| Windows RT 8.1 |
| ||||||||
| Windows Server 2008 R2 |
| ||||||||
| Windows Server 2012 R2 |
| ||||||||
| Windows Server 2016 |
|
Common Weakness Enumeration
References