Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Hyper-V vSMB can be exploited remotely via specially crafted application to execute arbitrary code.
- A remote code execution vulnerability in Microsoft COM for Windows can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Image can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows VBScript Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows can be exploited remotely via specially crafted document to execute arbitrary code.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
Original advisories
- CVE-2018-8166
- CVE-2018-8165
- CVE-2018-8164
- CVE-2018-8897
- CVE-2018-8141
- CVE-2018-8129
- CVE-2018-8142
- CVE-2018-8127
- CVE-2018-8124
- CVE-2018-0961
- CVE-2018-0824
- CVE-2018-8170
- CVE-2018-8174
- CVE-2018-8134
- CVE-2018-8136
- CVE-2018-8132
- CVE-2018-0854
- CVE-2018-0958
- CVE-2018-0959
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Microsoft-Windows-10
CVE list
- CVE-2018-8167 warning
- CVE-2018-8166 high
- CVE-2018-8165 high
- CVE-2018-8164 high
- CVE-2018-8897 high
- CVE-2018-8141 warning
- CVE-2018-8129 warning
- CVE-2018-8142 warning
- CVE-2018-8127 warning
- CVE-2018-8124 high
- CVE-2018-0961 high
- CVE-2018-0824 high
- CVE-2018-8170 warning
- CVE-2018-8174 critical
- CVE-2018-8134 high
- CVE-2018-8136 critical
- CVE-2018-8132 warning
- CVE-2018-0854 warning
- CVE-2018-0958 warning
- CVE-2018-0959 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!