Descrição
Multiple serious vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to gain privileges.
- A spoofing vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to spoof user interface.
- A memory corruption vulnerability in Windows Scripting Engine can be exploited remotely to obtain sensitive information.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
Comunicados originais
- CVE-2018-8557
- CVE-2018-8545
- CVE-2018-8542
- CVE-2018-8556
- CVE-2018-8543
- CVE-2018-8567
- CVE-2018-8564
- CVE-2018-8541
- CVE-2018-8552
- CVE-2018-8570
- CVE-2018-8555
- CVE-2018-8551
Exploração
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produtos relacionados
Lista de CVE
- CVE-2018-8588 critical
- CVE-2018-8557 critical
- CVE-2018-8545 warning
- CVE-2018-8542 critical
- CVE-2018-8556 critical
- CVE-2018-8543 critical
- CVE-2018-8567 high
- CVE-2018-8564 warning
- CVE-2018-8541 critical
- CVE-2018-8552 critical
- CVE-2018-8570 critical
- CVE-2018-8555 critical
- CVE-2018-8551 critical
Lista de KB
Saiba mais
Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com
Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!