Описание
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to bypass security restrictions.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
- CVE-2018-8510
CVE-2018-8503
CVE-2018-8473
CVE-2018-8511
CVE-2018-8505
CVE-2018-8513
CVE-2018-8512
CVE-2018-8491
CVE-2018-8460
CVE-2018-8530
CVE-2018-8509
CVE-2018-8500
Эксплуатация
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2018-8500 critical
- CVE-2018-8510 critical
- CVE-2018-8503 critical
- CVE-2018-8473 critical
- CVE-2018-8511 critical
- CVE-2018-8505 critical
- CVE-2018-8513 critical
- CVE-2018-8512 high
- CVE-2018-8491 critical
- CVE-2018-8460 critical
- CVE-2018-8530 warning
- CVE-2018-8509 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!