Описание
Windows MSHTML Platform Spoofing Vulnerability
FAQ
According to the CVSS metric, the attack complexity is high (AC:H). What does that mean for this vulnerability?
Successful exploitation of this vulnerability requires an attacker to take additional actions prior to exploitation to prepare the target environment.
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
An attacker would have to send the victim a malicious file that the victim would have to execute.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2008 for 32-bit Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 | ||
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) | ||
Windows Server 2012 R2 | ||
Windows Server 2012 R2 (Server Core installation) | ||
Windows 10 for 32-bit Systems | ||
Windows 10 for x64-based Systems | ||
Windows Server 2016 | ||
Windows 10 Version 1607 for 32-bit Systems |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
Yes
Latest Software Release
Exploitation Detected
DOS
N/A
EPSS
Процентиль: 100%
0.90957
Критический
7.5 High
CVSS3
Связанные уязвимости
CVSS3: 7.5
fstec
12 месяцев назад
Уязвимость платформы MSHTML операционных систем Microsoft Windows, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 100%
0.90957
Критический
7.5 High
CVSS3