Описание
Multiple serious vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to gain privileges.
- A spoofing vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to spoof user interface.
- A memory corruption vulnerability in Windows Scripting Engine can be exploited remotely to obtain sensitive information.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
Первичный источник обнаружения
- CVE-2018-8588
CVE-2018-8557
CVE-2018-8545
CVE-2018-8542
CVE-2018-8556
CVE-2018-8543
CVE-2018-8567
CVE-2018-8564
CVE-2018-8541
CVE-2018-8552
CVE-2018-8570
CVE-2018-8555
CVE-2018-8551
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2018-8588 critical
- CVE-2018-8557 critical
- CVE-2018-8545 warning
- CVE-2018-8542 critical
- CVE-2018-8556 critical
- CVE-2018-8543 critical
- CVE-2018-8567 high
- CVE-2018-8564 warning
- CVE-2018-8541 critical
- CVE-2018-8552 critical
- CVE-2018-8570 critical
- CVE-2018-8555 critical
- CVE-2018-8551 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!