Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information, bypass security restrictions, execute arbitrary code.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in DirectX Graphics Kernel can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Hyper-V vSMB can be exploited remotely via specially crafted application to execute arbitrary code.
- A remote code execution vulnerability in Microsoft COM for Windows can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Image can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows VBScript Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows can be exploited remotely via specially crafted document to execute arbitrary code.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
Первичный источник обнаружения
- CVE-2018-8167
CVE-2018-8166
CVE-2018-8165
CVE-2018-8164
CVE-2018-8897
CVE-2018-8141
CVE-2018-8129
CVE-2018-8142
CVE-2018-8127
CVE-2018-8124
CVE-2018-0961
CVE-2018-0824
CVE-2018-8170
CVE-2018-8174
CVE-2018-8134
CVE-2018-8136
CVE-2018-8132
CVE-2018-0854
CVE-2018-0958
CVE-2018-0959
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Microsoft-Windows-10
Список CVE
- CVE-2018-8167 warning
- CVE-2018-8166 high
- CVE-2018-8165 high
- CVE-2018-8164 high
- CVE-2018-8897 high
- CVE-2018-8141 warning
- CVE-2018-8129 warning
- CVE-2018-8142 warning
- CVE-2018-8127 warning
- CVE-2018-8124 high
- CVE-2018-0961 high
- CVE-2018-0824 high
- CVE-2018-8170 warning
- CVE-2018-8174 critical
- CVE-2018-8134 high
- CVE-2018-8136 critical
- CVE-2018-8132 warning
- CVE-2018-0854 warning
- CVE-2018-0958 warning
- CVE-2018-0959 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!