Beschreibung
Multiple serious vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to bypass security restrictions and execute arbitrary code.
Below is a complete list of vulnerabilities:
- Multiple security feature bypass vulnerabilities in Microsoft Edge can be exploited remotely via specially crafted documents to bypass security restrictions.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- Multiple memory corruption vulnerabilities in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- Multiple memory corruption vulnerabilities in Chakra can be exploited remotely via specially crafted website to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2018-8491
- CVE-2018-8460
- CVE-2018-8473
- CVE-2018-8511
- CVE-2018-8530
- CVE-2018-8513
- CVE-2018-8503
- CVE-2018-8509
- CVE-2018-8510
- CVE-2018-8505
CVE Liste
- CVE-2018-8510 critical
- CVE-2018-8503 critical
- CVE-2018-8473 critical
- CVE-2018-8511 critical
- CVE-2018-8505 critical
- CVE-2018-8513 critical
- CVE-2018-8512 critical
- CVE-2018-8491 critical
- CVE-2018-8460 critical
- CVE-2018-8530 critical
- CVE-2018-8509 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!