Microsoft just published an out-of-band patch for Internet Explorer. It fixes a memory corruption vulnerability in the scripting engine. This vulnerability is identified as CVE-2018-8653.
When successfully exploited, Internet Explorer could execute arbitrary code in the context of the current user. To exploit the vulnerability, the victim must just visit a malicious web page delivered through a phishing email or social engineering. 
- Execute arbitrary code in the context of the current user.
- In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website, for example, by sending an email.
- Internet Explorer versions 9, 10 & 11 are affected
- For a detailed list of the affected systems, Microsoft published the details here:
- Please install the Microsoft provided patches as soon as possible from:
|The bSecure Team notes that Palo Alto has released new vulnerability signatures to detect and protect users against this threat. All users whose workstations are on the protected side of one of these firewalls and utilize a vulnerability profile that blocks critical threats will have attempts to exploit this vulnerability blocked by the firewall. In practice, this means that any place where the security profiles for the traffic are set to one of the ISP configured default profiles, or are set to a phase2 profile, will be protected.|