Açıklama
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to bypass security restrictions.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
Orijinal öneriler
- CVE-2018-8503
- CVE-2018-8473
- CVE-2018-8511
- CVE-2018-8505
- CVE-2018-8513
- CVE-2018-8512
- CVE-2018-8491
- CVE-2018-8460
- CVE-2018-8530
- CVE-2018-8509
- CVE-2018-8500
Kötüye kullanma
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
İlgili ürünler
CVE Listesi
- CVE-2018-8500 critical
- CVE-2018-8510 critical
- CVE-2018-8503 critical
- CVE-2018-8473 critical
- CVE-2018-8511 critical
- CVE-2018-8505 critical
- CVE-2018-8513 critical
- CVE-2018-8512 high
- CVE-2018-8491 critical
- CVE-2018-8460 critical
- CVE-2018-8530 warning
- CVE-2018-8509 critical
KB Listesi
Daha fazlasını okuyun
Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com
Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!