Descrição
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to bypass security restrictions.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
Comunicados originais
- CVE-2018-8503
- CVE-2018-8473
- CVE-2018-8511
- CVE-2018-8505
- CVE-2018-8513
- CVE-2018-8512
- CVE-2018-8491
- CVE-2018-8460
- CVE-2018-8530
- CVE-2018-8509
- CVE-2018-8500
Exploração
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produtos relacionados
Lista de CVE
- CVE-2018-8500 critical
- CVE-2018-8510 critical
- CVE-2018-8503 critical
- CVE-2018-8473 critical
- CVE-2018-8511 critical
- CVE-2018-8505 critical
- CVE-2018-8513 critical
- CVE-2018-8512 high
- CVE-2018-8491 critical
- CVE-2018-8460 critical
- CVE-2018-8530 warning
- CVE-2018-8509 critical
Lista de KB
Saiba mais
Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com
Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!