4.3
CVSSv2

CVE-2017-8529

Published: 15/06/2017 Updated: 18/10/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 384
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, and Windows Server 2012 and R2 allow an malicious user to detect specific files on the user's computer when affected Microsoft scripting engines do not properly handle objects in memory, aka "Microsoft Browser Information Disclosure Vulnerability".

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft internet_explorer 11

microsoft edge -

microsoft internet_explorer 9

microsoft internet_explorer 10

Github Repositories

My CVE-2017-8529 files

cve-2017-8529 My CVE-2017-8529 files A PowerShell script to configure the registry fix in CVE-2017-8529

Windows-Server-Config This is a script I have been building and tweaking over several years Configure the following services Enable the Windows Update Service Stop and disable Print Spooler service Stop and disable Windows Audio Service Install SNMP service Check for, stop and disable Xbox services Stop and disable Computer Browser service Disable the WinHTTPAutoProxySvc (to

Be rid of CVE-2017-8529 with PowerShell Upon installing KB4022715 a registry key may be missing This script installs the registry key and closes the vulnerability CVE-2017-8529 Please have a look at the referenced for more information below portalmsrcmicrosoftcom/en-US/security-guidance/advisory/CVE-2017-8529 Use of the script is at ones own risk

Collection of PowerShell functinos and scripts a Blue Teamer might use

PowerShell-Blue-Team Collection of PowerShell functions and scripts a Blue Teamer might use Watch-PortScanps1 This cmdlet is used to discover attemtped port scans on a device It runs on an infinite loop This cmdlet can be used to send an email alert containing the log information, it can automatically added a source IP addresses accused of port scanning to the Windows Fi