Description
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Windows can be exploited remotely via specially crafted image to execute arbitrary code.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in MS XML can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Windows can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Win32k Graphics can be exploited remotely via specially crafted embedded to execute arbitrary code.
- A remote code execution vulnerability in Microsoft JET Database Engine can be exploited remotely via specially crafted to execute arbitrary code.
- An information disclosure vulnerability in Windows can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Registry can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Graphics Component can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely via specially crafted application to gain privileges.
Original advisories
- CVE-2018-8419
- CVE-2018-8447
- CVE-2018-8420
- CVE-2018-8468
- CVE-2018-8434
- CVE-2018-8332
- CVE-2018-8392
- CVE-2018-8393
- CVE-2018-8336
- CVE-2018-8442
- CVE-2018-8271
- CVE-2018-8410
- CVE-2018-8422
- CVE-2018-8446
- CVE-2018-8433
- CVE-2018-8440
- CVE-2018-8424
- CVE-2018-8443
- ADV180022
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Internet-Explorer
- Microsoft-Office
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
CVE list
- CVE-2018-8336 high
- CVE-2018-8433 warning
- CVE-2018-8442 high
- CVE-2018-8440 critical
- CVE-2018-8392 critical
- CVE-2018-8410 critical
- CVE-2018-8332 critical
- CVE-2018-8422 high
- CVE-2018-8271 high
- CVE-2018-8443 high
- CVE-2018-8475 critical
- CVE-2018-8419 high
- CVE-2018-8434 high
- CVE-2018-8420 critical
- CVE-2018-8424 high
- CVE-2018-8468 warning
- CVE-2018-8393 critical
- CVE-2018-8446 high
- CVE-2018-8447 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!