Lucene search

K

Microsoft Internet Explorer EditWith Broker API Sandbox Escape Vulnerability

🗓️ 20 Jul 2015 00:00:00Reported by Ashutosh Mehra (https://twitter.com/ashutoshmehra)Type 
zdi
 zdi
🔗 www.zerodayinitiative.com👁 14 Views

Microsoft Internet Explorer EditWith Broker API Sandbox Escape Vulnerability allows remote code execution in Protected Mode or Enhanced Protected Mode. Requires user interaction to visit a malicious page or open a malicious file. EditWith function flaw in the document broker can induce a race condition to execute arbitrary executables at medium integrity

Show more
Related
Refs

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo