Описание
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, cause denial of service, gain privileges.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to obtain sensitive information.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
- A remote code execution vulnerability in CredSSP can be exploited remotely via specially crafted application to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Video Control can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows Shell can be exploited remotely via specially crafted file to execute arbitrary code.
- An information disclosure vulnerability in Internet Explorer can be exploited remotely via specially crafted content to obtain sensitive information.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Installer can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely via specially crafted content to obtain sensitive information.
- An information disclosure vulnerability in Windows Remote Assistance can be exploited remotely via specially crafted to obtain sensitive information.
- An elevation of privilege vulnerability in Windows GDI can be exploited remotely via specially crafted application to gain privileges.
Первичный источник обнаружения
- CVE-2018-0888
CVE-2018-0889
CVE-2018-0885
CVE-2018-0886
CVE-2018-0881
CVE-2018-0883
CVE-2018-0929
CVE-2018-0904
CVE-2018-0868
CVE-2018-0901
CVE-2018-0900
CVE-2018-0891
CVE-2018-0897
CVE-2018-0896
CVE-2018-0895
CVE-2018-0894
CVE-2018-0899
CVE-2018-0898
CVE-2018-0935
CVE-2018-0813
CVE-2018-0878
CVE-2018-0811
CVE-2018-0817
CVE-2018-0816
CVE-2018-0815
CVE-2018-0814
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Internet-Explorer
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Edge
- ChakraCore
Список CVE
- CVE-2018-0811 high
- CVE-2018-0813 high
- CVE-2018-0814 high
- CVE-2018-0815 high
- CVE-2018-0816 high
- CVE-2018-0817 high
- CVE-2018-0868 high
- CVE-2018-0878 warning
- CVE-2018-0881 high
- CVE-2018-0883 critical
- CVE-2018-0885 high
- CVE-2018-0886 high
- CVE-2018-0888 high
- CVE-2018-0894 warning
- CVE-2018-0895 warning
- CVE-2018-0896 warning
- CVE-2018-0897 warning
- CVE-2018-0898 warning
- CVE-2018-0899 warning
- CVE-2018-0900 warning
- CVE-2018-0901 warning
- CVE-2018-0904 warning
- CVE-2018-0889 critical
- CVE-2018-0891 warning
- CVE-2018-0929 warning
- CVE-2018-0935 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!