Description
Multiple serious vulnerabilities have been found in Microsoft Development Tools. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
- A tampering vulnerability in Microsoft Macro Assembler can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in .NET Framework can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in ASP.NET can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in .NET Framework can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in MSR JavaScript Cryptography Library can be exploited remotely to bypass security restrictions.
- A cross-site-scripting (XSS) vulnerability Open Source Customization for Active Directory Federation Services can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Visual Studio can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in .NET Framework can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in PowerShell Editor Services can be exploited remotely to execute arbitrary code.
Fiches de renseignement originales
- CVE-2018-8202
- CVE-2018-8284
- CVE-2018-8171
- CVE-2018-8260
- CVE-2018-8319
- CVE-2018-8326
- CVE-2018-8172
- CVE-2018-8356
- CVE-2018-8327
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
Liste CVE
- CVE-2018-8356 high
- CVE-2018-8319 critical
- CVE-2018-8326 high
- CVE-2018-8202 critical
- CVE-2018-8172 critical
- CVE-2018-8260 critical
- CVE-2018-8327 critical
- CVE-2018-8171 critical
- CVE-2018-8232 critical
- CVE-2018-8284 critical
Liste KB
- 4338825
- 4338814
- 4338829
- 4338819
- 4338826
- 4345421
- 4345419
- 4345455
- 4345420
- 4345418
- 4338420
- 4338611
- 4338604
- 4338415
- 4338421
- 4338422
- 4338416
- 4338601
- 4336919
- 4338613
- 4338418
- 4338424
- 4338419
- 4338417
- 4339279
- 4336986
- 4338600
- 4338612
- 4336999
- 4338606
- 4336946
- 4338602
- 4338605
- 4338423
- 4342193
- 4338610
- 4342192
- 4342191
- 4346877
- 4344151
- 4344146
- 4343909
- 4344166
- 4344177
- 4344178
- 4344147
- 4344148
- 4343885
- 4344172
- 4344144
- 4343887
- 4344149
- 4344175
- 4344165
- 4344167
- 4343892
- 4344153
- 4344150
- 4344152
- 4344176
- 4344171
- 4344173
- 4344145
- 4343897
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !