Дата обнаружения
|
10/04/2018 |
Уровень угрозы
|
Critical |
Описание
|
Multiple serious vulnerabilities have been found in Microsoft Windows . Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, cause denial of service and possibly to bypass security restrictions. Below is a complete list of vulnerabilities:
|
Пораженные продукты
|
Windows 10 Version 1511 for 32-bit Systems |
Решение
|
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel) |
Первичный источник обнаружения
|
CVE-2018-0887 CVE-2018-0890 CVE-2018-0956 CVE-2018-0957 CVE-2018-0960 CVE-2018-0963 CVE-2018-0964 CVE-2018-0966 CVE-2018-0967 CVE-2018-0968 CVE-2018-0969 CVE-2018-0970 CVE-2018-0971 CVE-2018-0972 CVE-2018-0973 CVE-2018-0974 CVE-2018-0975 CVE-2018-0976 CVE-2018-1003 CVE-2018-1004 CVE-2018-1008 CVE-2018-1009 CVE-2018-1010 CVE-2018-1012 CVE-2018-1013 CVE-2018-1015 CVE-2018-1016 CVE-2018-8116 |
Оказываемое влияние
?
|
ACE
[?]
OSI
[?]
DoS
[?]
SB
[?]
PE
[?]
|
Связанные продукты
|
Microsoft Windows Microsoft Windows Server Microsoft Windows Server 2012 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows 10 Windows Defender |
CVE-IDS
|
CVE-2018-08870.0Unknown
CVE-2018-08900.0Unknown CVE-2018-09560.0Unknown CVE-2018-09570.0Unknown CVE-2018-09600.0Unknown CVE-2018-09630.0Unknown CVE-2018-09640.0Unknown CVE-2018-09660.0Unknown CVE-2018-09670.0Unknown CVE-2018-09680.0Unknown CVE-2018-09690.0Unknown CVE-2018-09700.0Unknown CVE-2018-09710.0Unknown CVE-2018-09720.0Unknown CVE-2018-09730.0Unknown CVE-2018-09740.0Unknown CVE-2018-09750.0Unknown CVE-2018-09760.0Unknown CVE-2018-10030.0Unknown CVE-2018-10040.0Unknown CVE-2018-10080.0Unknown CVE-2018-10090.0Unknown CVE-2018-10100.0Unknown CVE-2018-10120.0Unknown CVE-2018-10130.0Unknown CVE-2018-10150.0Unknown CVE-2018-10160.0Unknown CVE-2018-81160.0Unknown |
Microsoft official advisories
|
Microsoft Security Update Guide |
KB list
|
4093112 |
Эксплуатация
|
The following public exploits exists for this vulnerability: https://www.exploit-db.com/exploits/44466 https://www.exploit-db.com/exploits/44465 https://www.exploit-db.com/exploits/44459 https://www.exploit-db.com/exploits/44460 https://www.exploit-db.com/exploits/44461 https://www.exploit-db.com/exploits/44462 https://www.exploit-db.com/exploits/44463 https://www.exploit-db.com/exploits/44464 https://www.exploit-db.com/exploits/44458 Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details. |
Узнай статистику распространения уязвимостей в твоем регионе |