Cyber security news for all

More

    Internet Explorer is at risk from a security vulnerability

    The Microsoft Internet Explorer browser has a critical vulnerability. The group reports on its website. The error resulted in an attacker being able to run any program with the same rights as the user currently logged on.

    If the user has administrator rights, an attacker can even take complete control of the PC and view, change and delete data or create an account with full access rights. In order to exploit the vulnerability, attackers only have to lure their victims to a suitably prepared website.

    A so-called remote attack could allow criminals to exploit the security leak to gain complete control over the respective computer system. According to Microsoft, only a few targeted attacks are known so far, but it is still recommended to uninstall Internet Explorer at the moment. Because so far there is no patch that closes the security gap.

    Internet Explorer vulnerability

    A remote code execution vulnerability exists in the way that the scripting engine treats objects in Internet Explorer memory. The vulnerability could damage the memory so that an attacker could execute arbitrary code in the context of the current user.

    An attacker who successfully exploited the vulnerability could be granted the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs, view, change or delete data, or create new accounts with full user rights.

    CVE-2020-0674 A Vulnerability

    It exists in Microsoft Internet Explorer which is due to an unspecified vulnerability in the Internet Explorer scripting engine. Memory corruption is possible as a result. A remote, anonymous attacker can use this vulnerability to execute arbitrary code. To successfully exploit this vulnerability, the attacker would have to persuade the user to open a modified URL or website in their web browser or to open a modified file that uses the scripting engine.

    Recent Articles

    Hungarian banks were the target of a massive DDoS attack

    Several banks and the Hungarian Telekom have been the target of a cyber attack. The attacks are said to have come in several waves...

    The source code of Windows XP is leaked

    The source code of Windows XP is currently freely accessible. The media says that data first appeared on 4chan and is currently being exchanged...

    Hackers send malicious Azure Cloud apps to Microsoft

    Microsoft has banned some Azure Cloud applications from its cloud that the company identified as part of an attack infrastructure. Microsoft describes the approach...

    Vodafone experiences a vulnerability with fatal effects

    The injected JavaScript can access the session cookies from Vodafone website and send them to a server. An attacker can take over the session...

    Maze leaks data on its own platform

    The Maze ransomware has been up to almost a year and a half. This week, security experts warned about the actions of the cyber...

    Related Stories

    Leave A Reply

    Please enter your comment!
    Please enter your name here

    Stay on op - Ge the daily news in your inbox