Lucene search

K
zdiAnonymousZDI-16-677
HistoryJan 20, 2017 - 12:00 a.m.

Microsoft Windows JavaScript Array.concat Type Confusion Information Disclosure Vulnerability

2017-01-2000:00:00
Anonymous
www.zerodayinitiative.com
20

0.316 Low

EPSS

Percentile

97.0%

This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of the JavaScript Array.concat method. By performing actions in JavaScript an attacker can trigger a type confusion condition. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process.

0.316 Low

EPSS

Percentile

97.0%