Description
Multiple serious vulnerabilities have been found in Microsoft Development Tools. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
- A tampering vulnerability in Microsoft Macro Assembler can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in .NET Framework can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in ASP.NET can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in .NET Framework can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in MSR JavaScript Cryptography Library can be exploited remotely to bypass security restrictions.
- A cross-site-scripting (XSS) vulnerability Open Source Customization for Active Directory Federation Services can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Visual Studio can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in .NET Framework can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in PowerShell Editor Services can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2018-8202
- CVE-2018-8284
- CVE-2018-8171
- CVE-2018-8260
- CVE-2018-8319
- CVE-2018-8326
- CVE-2018-8172
- CVE-2018-8356
- CVE-2018-8327
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2018-8356 warning
- CVE-2018-8319 critical
- CVE-2018-8326 warning
- CVE-2018-8202 high
- CVE-2018-8172 critical
- CVE-2018-8260 high
- CVE-2018-8327 critical
- CVE-2018-8171 warning
- CVE-2018-8232 warning
- CVE-2018-8284 critical
KB list
- 4338825
- 4338814
- 4338829
- 4338819
- 4338826
- 4345421
- 4345419
- 4345455
- 4345420
- 4345418
- 4338420
- 4338611
- 4338604
- 4338415
- 4338421
- 4338422
- 4338416
- 4338601
- 4336919
- 4338613
- 4338418
- 4338424
- 4338419
- 4338417
- 4339279
- 4336986
- 4338600
- 4338612
- 4336999
- 4338606
- 4336946
- 4338602
- 4338605
- 4338423
- 4342193
- 4338610
- 4342192
- 4342191
- 4346877
- 4344151
- 4344146
- 4343909
- 4344166
- 4344177
- 4344178
- 4344147
- 4344148
- 4343885
- 4344172
- 4344144
- 4343887
- 4344149
- 4344175
- 4344165
- 4344167
- 4343892
- 4344153
- 4344150
- 4344152
- 4344176
- 4344171
- 4344173
- 4344145
- 4343897
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!