Beschreibung
Multiple serious vulnerabilities have been found in Microsoft browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions or obtain sensitive information.
Below is a complete list of vulnerabilities:
- An incorrect file marking mechanism in Microsoft Edge can be exploited remotely via a specially designed website to obtain sensitive information;
- An improper handling of objects in memory in Microsoft Internet explorer can be exploited remotely via a specially designed website to execute arbitrary code;
- Multiple incorrect handling of objects in memory vulnerabilities in Microsoft Edge can be exploited remotely via a specially designed website to execute arbitrary code;
- A security bypass vulnerability in Internet Explorer can be exploited remotely via a specially designed website to bypass security restrictions;
- Memory corruption vulnerability in ChakraCore component of Microsoft Edge scripting engine can be exploited remotely via unspecified attack vector to execute arbitrary code;
- Multiple incorrect handling of objects in memory vulnerabilities in Microsoft Edge can be exploited remotely via a specially designed website to obtain sensitive information;
- An incorrect handling of requests in Microsoft Edge can be exploited remotely via a specially designed website to bypass security restrictions.
Technical details
Vulnerability (4) allows to bypass Mark of the Web Tagging (MOTW).
Ursprüngliche Informationshinweise
- CVE-2018-8229
- CVE-2018-8236
- CVE-2018-8113
- CVE-2018-8234
- CVE-2018-8249
- CVE-2018-8110
- CVE-2018-8235
- CVE-2018-8267
- CVE-2018-0871
- CVE-2018-8111
- CVE-2018-0978
CVE Liste
- CVE-2018-8227 warning
- CVE-2018-8229 warning
- CVE-2018-8236 warning
- CVE-2018-8113 warning
- CVE-2018-8234 warning
- CVE-2018-8249 warning
- CVE-2018-8110 warning
- CVE-2018-8235 warning
- CVE-2018-8267 warning
- CVE-2018-0871 warning
- CVE-2018-8111 warning
- CVE-2018-0978 warning
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!