Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-8636

EPSS 82.71% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-8636

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Microsoft browsers in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user due to the way that Microsoft browser JavaScript engines render content when handling objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8634, CVE-2017-8635, CVE-2017-8638, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, and CVE-2017-8674.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows Internet Explorer和Edge JavaScript引擎安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Windows是美国微软(Microsoft)公司发布的一系列操作系统。Microsoft Internet Explorer(IE)和Edge都是美国微软(Microsoft)公司开发的Web浏览器。IE是Windows 10之前操作系统附带的默认浏览器。Edge是最新操作系统Windows 10附带的默认浏览器。JavaScript engines是其中的一个JavaScript引擎。 Microsoft Windows中的IE 9版本至10版本和Edge的JavaScript引擎
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Microsoft CorporationMicrosoft Scripting Engine Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016. -

II. Public POCs for CVE-2017-8636

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-8636

Please Login to view more intelligence information

Same Patch Batch · Microsoft Corporation · 2017-08-08 · 47 CVEs total

CVE-2017-8657Microsoft Windows Edge JavaScript引擎安全漏洞
CVE-2017-8662Microsoft Windows 10 Edge 信息泄露漏洞
CVE-2017-8666Microsoft Windows win32 信息泄露漏洞
CVE-2017-8670Microsoft Windows Edge JavaScript引擎安全漏洞
CVE-2017-8672Microsoft Windows Edge JavaScript引擎安全漏洞
CVE-2017-8673Microsoft Windows 10 安全漏洞
CVE-2017-8674Microsoft Windows 10 Edge JavaScript引擎安全漏洞
CVE-2017-8691Microsoft Windows 安全漏洞
CVE-2017-8669Microsoft Windows Internet Explorer和Edge 安全漏洞
CVE-2017-8659Microsoft Windows 10 Edge 信息泄露漏洞
CVE-2017-8661Microsoft Windows Edge 安全漏洞
CVE-2017-8656Microsoft Windows Edge JavaScript引擎安全漏洞
CVE-2017-8655Microsoft Windows Edge JavaScript引擎安全漏洞
CVE-2017-8654Microsoft SharePoint Server 跨站脚本漏洞
CVE-2017-8653Microsoft Windows Internet Explorer和Edge 安全漏洞
CVE-2017-8652Microsoft Windows Edge 信息泄露漏洞
CVE-2017-8651Microsoft Windows Server 2008和2012 Internet Explorer 安全漏洞
CVE-2017-8650Microsoft Windows 10 Edge 安全漏洞
CVE-2017-8647Microsoft Windows 10 Edge JavaScript引擎安全漏洞
CVE-2017-8646Microsoft Windows Edge JavaScript引擎安全漏洞

Showing top 20 of 47 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-8636

No comments yet


Leave a comment