Description
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, cause denial of service, gain privileges.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to obtain sensitive information.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
- A remote code execution vulnerability in CredSSP can be exploited remotely via specially crafted application to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Video Control can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows Shell can be exploited remotely via specially crafted file to execute arbitrary code.
- An information disclosure vulnerability in Internet Explorer can be exploited remotely via specially crafted content to obtain sensitive information.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely via specially crafted content to obtain sensitive information.
- An information disclosure vulnerability in Windows Remote Assistance can be exploited remotely via specially crafted to obtain sensitive information.
- An elevation of privilege vulnerability in Windows GDI can be exploited remotely via specially crafted application to gain privileges.
Original advisories
- CVE-2018-0889
- CVE-2018-0885
- CVE-2018-0886
- CVE-2018-0881
- CVE-2018-0883
- CVE-2018-0929
- CVE-2018-0904
- CVE-2018-0868
- CVE-2018-0901
- CVE-2018-0900
- CVE-2018-0891
- CVE-2018-0897
- CVE-2018-0896
- CVE-2018-0895
- CVE-2018-0894
- CVE-2018-0899
- CVE-2018-0898
- CVE-2018-0935
- CVE-2018-0813
- CVE-2018-0878
- CVE-2018-0811
- CVE-2018-0817
- CVE-2018-0816
- CVE-2018-0815
- CVE-2018-0814
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Internet-Explorer
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Edge
- ChakraCore
CVE list
- CVE-2018-0811 warning
- CVE-2018-0813 warning
- CVE-2018-0814 warning
- CVE-2018-0815 high
- CVE-2018-0816 high
- CVE-2018-0817 high
- CVE-2018-0868 high
- CVE-2018-0878 warning
- CVE-2018-0881 high
- CVE-2018-0883 critical
- CVE-2018-0885 high
- CVE-2018-0886 critical
- CVE-2018-0888 warning
- CVE-2018-0894 warning
- CVE-2018-0895 warning
- CVE-2018-0896 warning
- CVE-2018-0897 warning
- CVE-2018-0898 warning
- CVE-2018-0899 warning
- CVE-2018-0900 warning
- CVE-2018-0901 warning
- CVE-2018-0904 warning
- CVE-2018-0889 critical
- CVE-2018-0891 warning
- CVE-2018-0929 warning
- CVE-2018-0935 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!