説明
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, obtain sensitive information, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via IMPORTANTTHING to execute arbitrary code.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Browser can be exploited remotely via IMPORTANTTHING to gain privileges.
- A spoofing vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to spoof user interface.
- A remote code execution vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Browser can be exploited remotely via IMPORTANTTHING to obtain sensitive information.
- A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Edge can be exploited remotely via IMPORTANTTHING to obtain sensitive information.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to bypass security restrictions.
オリジナルアドバイザリー
- CVE-2018-8385
- CVE-2018-8266
- CVE-2018-8380
- CVE-2018-8381
- CVE-2018-8355
- CVE-2018-8390
- CVE-2018-8387
- CVE-2018-8357
- CVE-2018-8353
- CVE-2018-8383
- CVE-2018-8377
- CVE-2018-8389
- CVE-2018-8316
- CVE-2018-8388
- CVE-2018-8371
- CVE-2018-8351
- CVE-2018-8373
- CVE-2018-8403
- CVE-2018-8370
- CVE-2018-8358
- CVE-2018-8384
- CVE-2018-8359
エクスプロイテーション
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
関連製品
CVEリスト
- CVE-2018-8384 critical
- CVE-2018-8372 critical
- CVE-2018-8385 critical
- CVE-2018-8266 critical
- CVE-2018-8380 critical
- CVE-2018-8359 critical
- CVE-2018-8381 critical
- CVE-2018-8355 critical
- CVE-2018-8390 critical
- CVE-2018-8387 critical
- CVE-2018-8357 critical
- CVE-2018-8353 critical
- CVE-2018-8383 warning
- CVE-2018-8377 critical
- CVE-2018-8389 critical
- CVE-2018-8316 critical
- CVE-2018-8388 warning
- CVE-2018-8371 critical
- CVE-2018-8351 high
- CVE-2018-8373 critical
- CVE-2018-8403 critical
- CVE-2018-8370 warning
- CVE-2018-8358 warning
KBリスト
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!