Beschreibung
Multiple serious vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, bypass security restrictions and obtain sensitive information.
Below is a complete list of vulnerabilities:
- Memory corruption vulnerability in Microsoft browsers can be exploited remotely via a specially designed website to execute arbitrary code;
- Multiple vulnerabilities related to improper handling of objects in memory of Chakra scripting engine can be exploited remotely via a specially designed website to execute arbitrary code;
- Memory corruption vulnerability in Microsoft Edge can be exploited remotely via a specially designed website to execute arbitrary code;
- Unspecified vulnerability in Microsoft browsers can be exploited via unspecified vector to gain privileges;
- Multiple vulnerabilities in Internet Explorer can be exploited remotely via a specially designed website to execute arbitrary code;
- An incorrect HTTP content parsing method in Microsoft Edge can be exploited remotely via a specially designed website to spoof user interface;
- An improper hyperlinks validation in Internet Explorer can be exploited remotely via specially designed website to execute arbitrary code;
- An unspecified vulnerability in Microsoft browsers can be exploited remotely via a specially designed website to obtain sensitive information;
- An improper audio requests handling in WebAudio Library can be exploited remotely via a specially designed website to obtain sensitive information.
Ursprüngliche Informationshinweise
- CVE-2018-8266
- CVE-2018-8380
- CVE-2018-8387
- CVE-2018-8357
- CVE-2018-8353
- CVE-2018-8355
- CVE-2018-8383
- CVE-2018-8377
- CVE-2018-8389
- CVE-2018-8316
- CVE-2018-8388
- CVE-2018-8390
- CVE-2018-8385
- CVE-2018-8371
- CVE-2018-8351
- CVE-2018-8373
- CVE-2018-8403
- CVE-2018-8381
- CVE-2018-8370
- CVE-2018-8358
CVE Liste
- CVE-2018-8372 critical
- CVE-2018-8385 critical
- CVE-2018-8266 critical
- CVE-2018-8380 critical
- CVE-2018-8381 critical
- CVE-2018-8355 critical
- CVE-2018-8390 critical
- CVE-2018-8387 critical
- CVE-2018-8357 critical
- CVE-2018-8353 critical
- CVE-2018-8383 critical
- CVE-2018-8377 critical
- CVE-2018-8389 critical
- CVE-2018-8316 critical
- CVE-2018-8388 critical
- CVE-2018-8371 critical
- CVE-2018-8351 critical
- CVE-2018-8373 critical
- CVE-2018-8403 critical
- CVE-2018-8370 critical
- CVE-2018-8358 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!