Popis
Multiple serious vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to gain privileges.
- A spoofing vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to spoof user interface.
- A memory corruption vulnerability in Windows Scripting Engine can be exploited remotely to obtain sensitive information.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
Oficiální doporučení
- CVE-2018-8557
- CVE-2018-8545
- CVE-2018-8542
- CVE-2018-8556
- CVE-2018-8543
- CVE-2018-8567
- CVE-2018-8564
- CVE-2018-8541
- CVE-2018-8552
- CVE-2018-8570
- CVE-2018-8555
- CVE-2018-8551
Vykořisťování
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Související produkty
seznam CVE
- CVE-2018-8588 critical
- CVE-2018-8557 critical
- CVE-2018-8545 warning
- CVE-2018-8542 critical
- CVE-2018-8556 critical
- CVE-2018-8543 critical
- CVE-2018-8567 high
- CVE-2018-8564 warning
- CVE-2018-8541 critical
- CVE-2018-8552 critical
- CVE-2018-8570 critical
- CVE-2018-8555 critical
- CVE-2018-8551 critical
seznam KB
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!