Memory corruption in Microsoft Internet Explorer - CVE-2018-1020
Published: April 10, 2018 / Updated: April 10, 2018
Microsoft Internet Explorer
Detailed vulnerability description
The vulnerability exists due to boundary error when Internet Explorer improperly accesses objects in memory. A remote unauthenticated attacker can trick the victim into visiting a specially crafted website, trigger memory corruption and execute arbitrary code with privileges of the current user.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.