Description
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to bypass security restrictions.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2018-8503
- CVE-2018-8473
- CVE-2018-8511
- CVE-2018-8505
- CVE-2018-8513
- CVE-2018-8512
- CVE-2018-8491
- CVE-2018-8460
- CVE-2018-8530
- CVE-2018-8509
- CVE-2018-8500
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2018-8500 critical
- CVE-2018-8510 critical
- CVE-2018-8503 critical
- CVE-2018-8473 critical
- CVE-2018-8511 critical
- CVE-2018-8505 critical
- CVE-2018-8513 critical
- CVE-2018-8512 high
- CVE-2018-8491 critical
- CVE-2018-8460 critical
- CVE-2018-8530 warning
- CVE-2018-8509 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!