CVE-2016-3246 – Microsoft Edge InjectHtmlStream Memory Corruption Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2016-3246
Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Edge Memory Corruption Vulnerability." Microsoft Edge permite a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocida como "Microsoft Edge Memory Corruption Vulnerability". This vulnerability allows remote attackers to corrupt memory on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within InjectHtmlStream. By manipulating a document's elements an attacker can reveal the contents of memory and also cause memory corruption. • http://www.securityfocus.com/bid/91602 http://www.securitytracker.com/id/1036286 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-085 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-3264 – Microsoft Edge CGeolocationManager Use-After-Free Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2016-3264
Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Microsoft Browser Memory Corruption Vulnerability." Microsoft Internet Explorer 9 hasta la versión 11 y Microsoft Edge permiten a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de un sitio web manipulado, también conocida como "Microsoft Browser Memory Corruption Vulnerability". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Edge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The vulnerability relates to how Microsoft Edge requests permission from the user to allow a website to access device location information (for example, GPS). By performing certain actions in script, an attacker can force a CGeolocationManager object in memory to be reused after it has been freed. • http://www.securityfocus.com/bid/91598 http://www.securitytracker.com/id/1036283 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-084 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-085 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2016-3198
https://notcve.org/view.php?id=CVE-2016-3198
Microsoft Edge allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via a crafted document, aka "Microsoft Edge Security Feature Bypass." Microsoft Edge permite a atacantes remotos eludir el mecanismo de protección Content Security Policy (CSP) a través de un documento manipulado, también conocida como "Microsoft Edge Security Feature Bypass". • http://www.securitytracker.com/id/1036099 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-068 • CWE-254: 7PK - Security Features •
CVE-2016-3215 – Microsoft Windows PDF Library JPEG2000 COD Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2016-3215
Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 1511, and Microsoft Edge allow remote attackers to obtain sensitive information from process memory via a crafted PDF document, aka "Windows PDF Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3201. Microsoft Windows 8.1, Windows Server 2012 Gold y R2, Windows 10 1511 y Microsoft Edge permite a atacantes remotos obtener información sensible del proceso de memoria a través de un documento PDF manipulado, también conocida como "Windows PDF Information Disclosure Vulnerability", una vulnerabilidad diferente a CVE-2016-3201. This vulnerability allows a remote attacker to disclose sensitive information on vulnerable installations of Microsoft Windows PDF Library. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of JPEG2000 files. A crafted number of decomposition levels in a COD marker can trigger a read past the end of an allocated object. • http://www.securitytracker.com/id/1036099 http://www.zerodayinitiative.com/advisories/ZDI-16-370 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-068 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-080 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2016-3203 – Microsoft Windows PDF Library AES Encryption Out-Of-Bounds Read Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2016-3203
Microsoft Windows 8.1, Windows Server 2012 Gold and R2, Windows 10 Gold and 1511, and Microsoft Edge allow remote attackers to execute arbitrary code via a crafted PDF document, aka "Windows PDF Remote Code Execution Vulnerability." Microsoft Windows 8.1, Windows Server 2012 Gold y R2, Windows 10 Gold y 1511 y Microsoft Edge permiten a atacantes remotos ejecutar código arbitrario a través de un documento PDF manipulado, también conocida como "Windows PDF Remote Code Execution Vulnerability". This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Microsoft Windows PDF Library. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of AES crypt filters. A crafted Length of an AES crypt filter object can trigger a read past the end of an allocated buffer. • http://www.securityfocus.com/bid/91086 http://www.securitytracker.com/id/1036099 http://www.zerodayinitiative.com/advisories/ZDI-16-369 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-068 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-080 • CWE-20: Improper Input Validation •