Descripción
Multiple serious vulnerabilities have been found in Microsoft Development Tools. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
- A tampering vulnerability in Microsoft Macro Assembler can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in .NET Framework can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in ASP.NET can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in .NET Framework can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in MSR JavaScript Cryptography Library can be exploited remotely to bypass security restrictions.
- A cross-site-scripting (XSS) vulnerability Open Source Customization for Active Directory Federation Services can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Visual Studio can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in .NET Framework can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in PowerShell Editor Services can be exploited remotely to execute arbitrary code.
Notas informativas originales
- CVE-2018-8202
- CVE-2018-8284
- CVE-2018-8171
- CVE-2018-8260
- CVE-2018-8319
- CVE-2018-8326
- CVE-2018-8172
- CVE-2018-8356
- CVE-2018-8327
Explotación
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
Lista CVE
- CVE-2018-8356 high
- CVE-2018-8319 critical
- CVE-2018-8326 high
- CVE-2018-8202 critical
- CVE-2018-8172 critical
- CVE-2018-8260 critical
- CVE-2018-8327 critical
- CVE-2018-8171 critical
- CVE-2018-8232 critical
- CVE-2018-8284 critical
Lista KB
- 4338825
- 4338814
- 4338829
- 4338819
- 4338826
- 4345421
- 4345419
- 4345455
- 4345420
- 4345418
- 4338420
- 4338611
- 4338604
- 4338415
- 4338421
- 4338422
- 4338416
- 4338601
- 4336919
- 4338613
- 4338418
- 4338424
- 4338419
- 4338417
- 4339279
- 4336986
- 4338600
- 4338612
- 4336999
- 4338606
- 4336946
- 4338602
- 4338605
- 4338423
- 4342193
- 4338610
- 4342192
- 4342191
- 4346877
- 4344151
- 4344146
- 4343909
- 4344166
- 4344177
- 4344178
- 4344147
- 4344148
- 4343885
- 4344172
- 4344144
- 4343887
- 4344149
- 4344175
- 4344165
- 4344167
- 4343892
- 4344153
- 4344150
- 4344152
- 4344176
- 4344171
- 4344173
- 4344145
- 4343897
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!