Popis
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to bypass security restrictions.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
Oficiální doporučení
- CVE-2018-8503
- CVE-2018-8473
- CVE-2018-8511
- CVE-2018-8505
- CVE-2018-8513
- CVE-2018-8512
- CVE-2018-8491
- CVE-2018-8460
- CVE-2018-8530
- CVE-2018-8509
- CVE-2018-8500
Vykořisťování
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Související produkty
seznam CVE
- CVE-2018-8500 critical
- CVE-2018-8510 critical
- CVE-2018-8503 critical
- CVE-2018-8473 critical
- CVE-2018-8511 critical
- CVE-2018-8505 critical
- CVE-2018-8513 critical
- CVE-2018-8512 high
- CVE-2018-8491 critical
- CVE-2018-8460 critical
- CVE-2018-8530 warning
- CVE-2018-8509 critical
seznam KB
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!