Beschreibung
Multiple serious vulnerabilities have been found in Microsoft browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions or obtain sensitive information.
Below is a complete list of vulnerabilities:
- An incorrect file marking mechanism in Microsoft Edge can be exploited remotely via a specially designed website to obtain sensitive information;
 - An improper handling of objects in memory in Microsoft Internet explorer can be exploited remotely via a specially designed website to execute arbitrary code;
 - Multiple incorrect handling of objects in memory vulnerabilities in Microsoft Edge can be exploited remotely via a specially designed website to execute arbitrary code;
 - A security bypass vulnerability in Internet Explorer can be exploited remotely via a specially designed website to bypass security restrictions;
 - Memory corruption vulnerability in ChakraCore component of Microsoft Edge scripting engine can be exploited remotely via unspecified attack vector to execute arbitrary code;
 - Multiple incorrect handling of objects in memory vulnerabilities in Microsoft Edge can be exploited remotely via a specially designed website to obtain sensitive information;
 - An incorrect handling of requests in Microsoft Edge can be exploited remotely via a specially designed website to bypass security restrictions.
 
Technical details
Vulnerability (4) allows to bypass Mark of the Web Tagging (MOTW).
Ursprüngliche Informationshinweise
- CVE-2018-8229
 - CVE-2018-8236
 - CVE-2018-8113
 - CVE-2018-8234
 - CVE-2018-8249
 - CVE-2018-8110
 - CVE-2018-8235
 - CVE-2018-8267
 - CVE-2018-0871
 - CVE-2018-8111
 - CVE-2018-0978
 
CVE Liste
- CVE-2018-8227 warning
 - CVE-2018-8229 warning
 - CVE-2018-8236 warning
 - CVE-2018-8113 warning
 - CVE-2018-8234 warning
 - CVE-2018-8249 warning
 - CVE-2018-8110 warning
 - CVE-2018-8235 warning
 - CVE-2018-8267 warning
 - CVE-2018-0871 warning
 - CVE-2018-8111 warning
 - CVE-2018-0978 warning
 
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
                                    Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!