Description
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Edge based on Edge HTML can be exploited remotely via specially crafted content to obtain sensitive information.
- A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Browser can be exploited remotely via specially crafted content to obtain sensitive information.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to bypass security restrictions.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Internet Explorer can be exploited remotely via specially crafted application to bypass security restrictions.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
Original advisories
- CVE-2018-0945
- CVE-2018-0946
- CVE-2018-0951
- CVE-2018-0953
- CVE-2018-0954
- CVE-2018-1021
- CVE-2018-8123
- CVE-2018-1022
- CVE-2018-8130
- CVE-2018-8178
- CVE-2018-8128
- CVE-2018-8133
- CVE-2018-8114
- CVE-2018-0955
- CVE-2018-8139
- CVE-2018-1025
- CVE-2018-8112
- CVE-2018-8145
- CVE-2018-8126
- CVE-2018-8137
- CVE-2018-8122
- CVE-2018-8179
- CVE-2018-8177
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2018-0943 critical
- CVE-2018-0945 critical
- CVE-2018-0946 critical
- CVE-2018-0951 critical
- CVE-2018-0953 critical
- CVE-2018-0954 critical
- CVE-2018-1021 warning
- CVE-2018-8123 warning
- CVE-2018-1022 critical
- CVE-2018-8130 critical
- CVE-2018-8178 critical
- CVE-2018-8128 critical
- CVE-2018-8133 critical
- CVE-2018-8114 critical
- CVE-2018-0955 critical
- CVE-2018-8139 critical
- CVE-2018-1025 warning
- CVE-2018-8112 warning
- CVE-2018-8145 critical
- CVE-2018-8126 high
- CVE-2018-8137 critical
- CVE-2018-8122 critical
- CVE-2018-8179 critical
- CVE-2018-8177 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!