Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Hyper-V vSMB can be exploited remotely via specially crafted application to execute arbitrary code.
- A remote code execution vulnerability in Microsoft COM for Windows can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Image can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows VBScript Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows can be exploited remotely via specially crafted document to execute arbitrary code.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
Original advisories
- CVE-2018-8166
- CVE-2018-8165
- CVE-2018-8164
- CVE-2018-8897
- CVE-2018-8141
- CVE-2018-8129
- CVE-2018-8142
- CVE-2018-8127
- CVE-2018-8124
- CVE-2018-0961
- CVE-2018-0824
- CVE-2018-8170
- CVE-2018-8174
- CVE-2018-8134
- CVE-2018-8136
- CVE-2018-8132
- CVE-2018-0854
- CVE-2018-0958
- CVE-2018-0959
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Microsoft-Windows-10
CVE list
- CVE-2018-8167 high
- CVE-2018-8166 high
- CVE-2018-8165 critical
- CVE-2018-8164 critical
- CVE-2018-8897 critical
- CVE-2018-8141 warning
- CVE-2018-8129 high
- CVE-2018-8142 high
- CVE-2018-8127 high
- CVE-2018-8124 high
- CVE-2018-0961 critical
- CVE-2018-0824 critical
- CVE-2018-8170 high
- CVE-2018-8174 critical
- CVE-2018-8134 high
- CVE-2018-8136 critical
- CVE-2018-8132 high
- CVE-2018-0854 high
- CVE-2018-0958 high
- CVE-2018-0959 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!