LanGuard reports



Supported OVAL Bulletins


More information on 2024 updates



ID:
CISEC:5856
Title:
Microsoft RemoteFX Virtual GPU miniport driver Elevation of Privilege Vulnerability This affects Windows Server 2016, Windows 10, Windows 81, Windows 7, Windows Server 2019
Type:
Software
Bulletins:
CISEC:5856
CVE-2018-8471
Severity:
High
Description:
An elevation of privilege vulnerability exists in the way that the Microsoft RemoteFX Virtual GPU miniport driver handles objects in memory, aka "Microsoft RemoteFX Virtual GPU miniport driver Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 8.1, Windows 7, Windows Server 2019.
Applies to:
Created:
2018-12-21
Updated:
2024-01-17

ID:
CISEC:5858
Title:
Microsoft Outlook Remote Code Execution Vulnerability This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook This CVE ID is unique from CVE-2018-8522, CVE-2018-8524, CVE-2018-8576
Type:
Mail
Bulletins:
CISEC:5858
CVE-2018-8582
Severity:
High
Description:
A remote code execution vulnerability exists in the way that Microsoft Outlook parses specially modified rule export files, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook. This CVE ID is unique from CVE-2018-8522, CVE-2018-8524, CVE-2018-8576.
Applies to:
Microsoft Outlook
Created:
2018-12-21
Updated:
2024-01-17

ID:
CISEC:5854
Title:
DirectX Information Disclosure Vulnerability This affects Windows 7, Windows Server 2012 R2, Windows RT 81, Windows Server 2012, Windows 81, Windows Server 2008 R2
Type:
Software
Bulletins:
CISEC:5854
CVE-2018-8563
Severity:
Low
Description:
An information disclosure vulnerability exists when DirectX improperly handles objects in memory, aka "DirectX Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2008 R2.
Applies to:
Created:
2018-12-21
Updated:
2024-01-17

ID:
CISEC:5853
Title:
DirectX Elevation of Privilege Vulnerability This affects Windows Server 2012 R2, Windows RT 81, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows 81, Windows 10, Windows 10 Servers This CVE ID is...
Type:
Software
Bulletins:
CISEC:5853
CVE-2018-8561
Severity:
High
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory, aka "DirectX Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8485, CVE-2018-8554.
Applies to:
Created:
2018-12-21
Updated:
2024-01-17

ID:
CISEC:5855
Title:
Chakra Scripting Engine Memory Corruption Vulnerability This affects Microsoft Edge, ChakraCore This CVE ID is unique from CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557,...
Type:
Software
Bulletins:
CISEC:5855
CVE-2018-8541
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557, CVE-2018-8588.
Applies to:
Created:
2018-12-21
Updated:
2024-01-17

ID:
CISEC:5838
Title:
Windows Win32k Elevation of Privilege Vulnerability This affects Windows Server 2008, Windows 7, Windows Server 2008 R2
Type:
Software
Bulletins:
CISEC:5838
CVE-2018-8589
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys, aka "Windows Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.
Applies to:
Created:
2018-12-14
Updated:
2024-01-17

ID:
CISEC:5840
Title:
Windows Audio Service Information Disclosure Vulnerability This affects Windows 10 Servers, Windows 10, Windows Server 2019
Type:
Software
Bulletins:
CISEC:5840
CVE-2018-8454
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Audio Service fails to properly handle objects in memory, aka "Windows Audio Service Information Disclosure Vulnerability." This affects Windows 10 Servers, Windows 10, Windows Server 2019.
Applies to:
Created:
2018-12-14
Updated:
2024-01-17

ID:
CISEC:5841
Title:
Windows ALPC Elevation of Privilege Vulnerability This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers
Type:
Software
Bulletins:
CISEC:5841
CVE-2018-8584
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows Server 2019, Windows 10 Servers.
Applies to:
Created:
2018-12-14
Updated:
2024-01-17

ID:
CISEC:5835
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5835
CVE-2018-8506
Severity:
Low
Description:
CVE-2018-8506 | Microsoft Windows Codecs Library Information Disclosure Vulnerability
Applies to:
Created:
2018-12-14
Updated:
2024-01-17

ID:
CISEC:5837
Title:
MS XML Remote Code Execution Vulnerability This affects Windows 7, Windows Server 2012 R2, Windows RT 81, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 81, Windows Server 2016, Windows Server...
Type:
Software
Bulletins:
CISEC:5837
CVE-2018-8494
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka "MS XML Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-12-14
Updated:
2024-01-17

ID:
CISEC:5836
Title:
Microsoft Edge Memory Corruption Vulnerability This affects Microsoft Edge, ChakraCore This CVE ID is unique from CVE-2018-8509
Type:
Software
Bulletins:
CISEC:5836
CVE-2018-8473
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8509.
Applies to:
Created:
2018-12-14
Updated:
2024-01-17

ID:
CISEC:5839
Title:
Microsoft Edge Elevation of Privilege Vulnerability This affects Microsoft Edge
Type:
Software
Bulletins:
CISEC:5839
CVE-2018-8567
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Microsoft Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain, aka "Microsoft Edge Elevation of Privilege Vulnerability." This affects Microsoft Edge.
Applies to:
Created:
2018-12-14
Updated:
2024-01-17

ID:
CISEC:5842
Title:
Chakra Scripting Engine Memory Corruption Vulnerability This affects Microsoft Edge, ChakraCore This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8556,...
Type:
Software
Bulletins:
CISEC:5842
CVE-2018-8588
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8541, CVE-2018-8542, CVE-2018-8543, CVE-2018-8551, CVE-2018-8555, CVE-2018-8556, CVE-2018-8557.
Applies to:
Created:
2018-12-14
Updated:
2024-01-17

ID:
CISEC:5823
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5823
CVE-2018-8472
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5825
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5825
CVE-2018-8453
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5826
Title:
NTFS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5826
CVE-2018-8411
Severity:
High
Description:
An elevation of privilege vulnerability exists when NTFS improperly checks access, aka "NTFS Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5833
Title:
Linux On Windows Elevation Of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5833
CVE-2018-8329
Severity:
High
Description:
An Elevation of Privilege vulnerability exists in Windows Subsystem for Linux when it fails to properly handle objects in memory, aka "Linux On Windows Elevation Of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5832
Title:
DirectX Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5832
CVE-2018-8486
Severity:
Low
Description:
An information disclosure vulnerability exists when DirectX improperly handles objects in memory, aka "DirectX Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5834
Title:
DirectX Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5834
CVE-2018-8320
Severity:
Medium
Description:
A security feature bypass vulnerability exists in DNS Global Blocklist feature, aka "Windows DNS Security Feature Bypass Vulnerability." This affects Windows Server 2012 R2, Windows Server 2008, Windows Server 2012, Windows Server 2019, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5822
Title:
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5822
CVE-2018-8484
Severity:
High
Description:
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8400, CVE-2018-8401, CVE-2018-8406.
Applies to:
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5827
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5827
CVE-2018-8503
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8505, CVE-2018-8510, CVE-2018-8511, CVE-2018-8513.
Applies to:
Microsoft Edge
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5828
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5828
CVE-2018-8513
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8505, CVE-2018-8510, CVE-2018-8511.
Applies to:
Microsoft Edge
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5829
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5829
CVE-2018-8505
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8510, CVE-2018-8511, CVE-2018-8513.
Applies to:
Microsoft Edge
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5830
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5830
CVE-2018-8511
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8505, CVE-2018-8510, CVE-2018-8513.
Applies to:
Microsoft Edge
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5831
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5831
CVE-2018-8510
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8503, CVE-2018-8505, CVE-2018-8511, CVE-2018-8513.
Applies to:
Microsoft Edge
Created:
2018-12-07
Updated:
2024-01-17

ID:
CISEC:5764
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5764
CVE-2018-8504
Severity:
High
Description:
CVE-2018-8504 | Microsoft Word Remote Code Execution Vulnerability
Applies to:
Office 2010
Office 2013
Office 2016
Sharepoint Server 2010
Word 2010
Word 2013
Word 2016
Created:
2018-11-30
Updated:
2024-01-17

ID:
CISEC:5765
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5765
CVE-2018-8429
Severity:
Medium
Description:
CVE-2018-8429 | Microsoft Excel Information Disclosure Vulnerability
Applies to:
Excel 2010
Excel 2013
Excel 2016
Excel Viewer 2007
Office Compatibility Pack
Created:
2018-11-30
Updated:
2024-01-17

ID:
CISEC:5767
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5767
CVE-2018-8502
Severity:
High
Description:
CVE-2018-8502 | Microsoft Excel Remote Code Execution Vulnerability
Applies to:
Excel 2010
Excel 2013
Excel 2016
Office 2013
Office 2016
Created:
2018-11-30
Updated:
2024-01-17

ID:
CISEC:5768
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5768
CVE-2018-8512
Severity:
Medium
Description:
CVE-2018-8512 | Microsoft Edge Security Feature Bypass Vulnerability
Applies to:
Created:
2018-11-30
Updated:
2024-01-17

ID:
CISEC:5769
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5769
CVE-2018-8501
Severity:
High
Description:
CVE-2018-8501 | Microsoft PowerPoint Remote Code Execution Vulnerability
Applies to:
Office 2010
Office 2013
Office 2016
Powerpoint 2010
Powerpoint 2013
Powerpoint 2016
Powerpoint Viewer 2010
Created:
2018-11-30
Updated:
2024-01-17

ID:
CISEC:5770
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5770
CVE-2018-8498
Severity:
Low
Description:
CVE-2018-8498 | Microsoft SharePoint Elevation of Privilege Vulnerability
Applies to:
Sharepoint Enterprise Server 2013
Sharepoint Enterprise Server 2016
Created:
2018-11-30
Updated:
2024-01-17

ID:
CISEC:5771
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5771
CVE-2018-8448
Severity:
Medium
Description:
CVE-2018-8448 | Microsoft Exchange Server Elevation of Privilege Vulnerability
Applies to:
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Created:
2018-11-30
Updated:
2024-01-17

ID:
CISEC:5772
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5772
CVE-2018-8518
Severity:
Low
Description:
CVE-2018-8518 | Microsoft SharePoint Elevation of Privilege Vulnerability
Applies to:
Sharepoint Enterprise Server 2013
Sharepoint Enterprise Server 2016
Created:
2018-11-30
Updated:
2024-01-17

ID:
CISEC:5751
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5751
CVE-2018-8530
Severity:
Medium
Description:
CVE-2018-8530 | Microsoft Edge Security Feature Bypass Vulnerability
Applies to:
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5752
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5752
CVE-2018-8509
Severity:
High
Description:
CVE-2018-8509 | Microsoft Edge Memory Corruption Vulnerability
Applies to:
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5749
Title:
Microsoft JET Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5749
CVE-2018-8393
Severity:
High
Description:
A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system, aka "Microsoft JET Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8392.
Applies to:
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5750
Title:
Microsoft JET Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5750
CVE-2018-8392
Severity:
High
Description:
A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system, aka "Microsoft JET Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8393.
Applies to:
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5757
Title:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds write vulnerability
Type:
Software
Bulletins:
CISEC:5757
CVE-2018-12848
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5753
Title:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5753
CVE-2018-12778
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5754
Title:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5754
CVE-2018-12850
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5755
Title:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5755
CVE-2018-12840
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5756
Title:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5756
CVE-2018-12849
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5758
Title:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5758
CVE-2018-12801
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5759
Title:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5759
CVE-2018-12775
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20058 and earlier, 2017.011.30099 and earlier, and 2015.006.30448 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-11-26
Updated:
2024-01-17

ID:
CISEC:5746
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5746
CVE-2018-8271
Severity:
Low
Description:
An information disclosure vulnerability exists in Windows when the Windows bowser.sys kernel-mode driver fails to properly handle objects in memory, aka "Windows Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-11-16
Updated:
2024-01-17

ID:
CISEC:5747
Title:
Win32k Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5747
CVE-2018-8332
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Win32k Graphics Remote Code Execution Vulnerability." This affects Windows 7, Microsoft Office, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-11-16
Updated:
2024-01-17

ID:
CISEC:5748
Title:
.NET Framework Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5748
CVE-2018-8421
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft .NET Framework processes untrusted input, aka ".NET Framework Remote Code Execution Vulnerability." This affects Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 4.7/4.7.1/4.7.2, Microsoft .NET Framework 3.0, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2, Microsoft .NET Framework 4.7.1/4.7.2, Microsoft .NET Framework 4.7.2, Microsoft .NET Framework 2.0.
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.7
Created:
2018-11-16
Updated:
2024-01-17

ID:
CISEC:5722
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5722
CVE-2018-8444
Severity:
Medium
Description:
An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests, aka "Windows SMB Information Disclosure Vulnerability." This affects Windows Server 2012, Windows 10, Windows 8.1, Windows RT 8.1, Windows Server 2012 R2.
Applies to:
Created:
2018-11-02
Updated:
2024-01-17

ID:
CISEC:5721
Title:
Windows SMB Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5721
CVE-2018-8335
Severity:
High
Description:
The Credential Security Support Provider protocol (CredSSP) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709 Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how CredSSP validates request during the authentication process, aka "CredSSP Remote Code Execution Vulnerability".
Applies to:
Created:
2018-11-02
Updated:
2024-01-17

ID:
CISEC:5736
Title:
Windows ALPC Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5736
CVE-2018-8440
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC), aka "Windows ALPC Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-11-02
Updated:
2024-01-17

ID:
CISEC:5733
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5733
CVE-2018-8428
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8431.
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-11-02
Updated:
2024-01-17

ID:
CISEC:5734
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5734
CVE-2018-8431
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint Server, Microsoft SharePoint. This CVE ID is unique from CVE-2018-8428.
Applies to:
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-11-02
Updated:
2024-01-17

ID:
CISEC:5735
Title:
Microsoft Office SharePoint XSS Vulnerability
Type:
Software
Bulletins:
CISEC:5735
CVE-2018-8426
Severity:
Low
Description:
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft Office SharePoint XSS Vulnerability." This affects Microsoft SharePoint Server, Microsoft SharePoint.
Applies to:
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-11-02
Updated:
2024-01-17

ID:
CISEC:5723
Title:
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5723
CVE-2018-8462
Severity:
High
Description:
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-11-02
Updated:
2024-01-17

ID:
CISEC:5724
Title:
Device Guard Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5724
CVE-2018-8449
Severity:
Low
Description:
A security feature bypass exists when Device Guard incorrectly validates an untrusted file, aka "Device Guard Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-11-02
Updated:
2024-01-17

ID:
CISEC:5702
Title:
Windows Subsystem for Linux Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5702
CVE-2018-8337
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Windows Subsystem for Linux improperly handles case sensitivity, aka "Windows Subsystem for Linux Security Feature Bypass Vulnerability." This affects Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5703
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5703
CVE-2018-8441
Severity:
Medium
Description:
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux, aka "Windows Subsystem for Linux Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5685
Title:
Windows Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5685
CVE-2018-8434
Severity:
Medium
Description:
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system, aka "Windows Hyper-V Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5697
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5697
CVE-2018-8424
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8422.
Applies to:
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5699
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5699
CVE-2018-8422
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8424.
Applies to:
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5693
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5693
CVE-2018-8391
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8354, CVE-2018-8456, CVE-2018-8457, CVE-2018-8459.
Applies to:
Microsoft Edge
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5694
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5694
CVE-2018-8456
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8354, CVE-2018-8391, CVE-2018-8457, CVE-2018-8459.
Applies to:
Microsoft Edge
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5695
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5695
CVE-2018-8354
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8391, CVE-2018-8456, CVE-2018-8457, CVE-2018-8459.
Applies to:
Microsoft Edge
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5696
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5696
CVE-2018-8459
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8354, CVE-2018-8391, CVE-2018-8456, CVE-2018-8457.
Applies to:
Microsoft Edge
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5701
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5701
CVE-2018-8457
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8354, CVE-2018-8391, CVE-2018-8456, CVE-2018-8459.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5700
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5700
CVE-2018-8452
Severity:
Medium
Description:
An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft browsers, aka "Scripting Engine Information Disclosure Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5720
Title:
Microsoft Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5720
CVE-2018-8315
Severity:
Medium
Description:
An information disclosure vulnerability exists when the browser scripting engine improperly handle object types, aka "Microsoft Scripting Engine Information Disclosure Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5698
Title:
Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5698
CVE-2018-8433
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory, aka "Microsoft Graphics Component Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5719
Title:
Microsoft Edge PDF Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5719
CVE-2018-8464
Severity:
High
Description:
An remote code execution vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory, aka "Microsoft Edge PDF Remote Code Execution Vulnerability." This affects Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-10-26
Updated:
2024-01-17

ID:
CISEC:5668
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5668
CVE-2018-8336
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8419, CVE-2018-8442, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5669
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5669
CVE-2018-8446
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8336, CVE-2018-8419, CVE-2018-8442, CVE-2018-8443, CVE-2018-8445.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5670
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5670
CVE-2018-8419
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8336, CVE-2018-8442, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5671
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5671
CVE-2018-8445
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8336, CVE-2018-8419, CVE-2018-8442, CVE-2018-8443, CVE-2018-8446.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5672
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5672
CVE-2018-8455
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5673
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5673
CVE-2018-8443
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8336, CVE-2018-8419, CVE-2018-8442, CVE-2018-8445, CVE-2018-8446.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5674
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5674
CVE-2018-8442
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8336, CVE-2018-8419, CVE-2018-8443, CVE-2018-8445, CVE-2018-8446.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5684
Title:
Windows Hyper-V Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5684
CVE-2018-8435
Severity:
Low
Description:
A security feature bypass vulnerability exists when Windows Hyper-V BIOS loader fails to provide a high-entropy source, aka "Windows Hyper-V Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5683
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5683
CVE-2018-8439
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Windows Hyper-V Remote Code Execution Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0965.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5688
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5688
CVE-2018-0965
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Windows Hyper-V Remote Code Execution Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0965.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5686
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5686
CVE-2018-8438
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka "Windows Hyper-V Denial of Service Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8436, CVE-2018-8437.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5687
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5687
CVE-2018-8436
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Windows Hyper-V BIOS loader fails to provide a high-entropy source, aka "Windows Hyper-V Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5675
Title:
Microsoft Edge Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:5675
CVE-2018-8425
Severity:
Medium
Description:
A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content, aka "Microsoft Edge Spoofing Vulnerability." This affects Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5677
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5677
CVE-2018-8366
Severity:
Low
Description:
An information disclosure vulnerability exists when the Microsoft Edge Fetch API incorrectly handles a filtered response type, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5678
Title:
Microsoft Edge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5678
CVE-2018-8463
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Microsoft Edge that could allow an attacker to escape from the AppContainer sandbox in the browser, aka "Microsoft Edge Elevation of Privilege Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8469.
Applies to:
Microsoft Edge
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5676
Title:
Microsoft Edge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5676
CVE-2018-8469
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Microsoft Edge that could allow an attacker to escape from the AppContainer sandbox in the browser, aka "Microsoft Edge Elevation of Privilege Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8463.
Applies to:
Microsoft Edge
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5690
Title:
Internet Explorer Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5690
CVE-2018-8470
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Internet Explorer due to how scripts are handled that allows a universal cross-site scripting (UXSS) condition, aka "Internet Explorer Security Feature Bypass Vulnerability." This affects Internet Explorer 11.
Applies to:
Microsoft Internet Explorer 11
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5691
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5691
CVE-2018-8461
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 11. This CVE ID is unique from CVE-2018-8447.
Applies to:
Microsoft Internet Explorer 11
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5692
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5692
CVE-2018-8447
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8461.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5679
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5679
CVE-2018-8465
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8466, CVE-2018-8467.
Applies to:
Microsoft Edge
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5680
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5680
CVE-2018-8467
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8465, CVE-2018-8466.
Applies to:
Microsoft Edge
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5681
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5681
CVE-2018-8367
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8465, CVE-2018-8466, CVE-2018-8467.
Applies to:
Microsoft Edge
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5682
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5682
CVE-2018-8466
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8367, CVE-2018-8465, CVE-2018-8467.
Applies to:
Microsoft Edge
Created:
2018-10-19
Updated:
2024-01-17

ID:
CISEC:5615
Title:
Windows PDF Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5615
CVE-2018-8350
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Windows PDF Library improperly handles objects in memory, aka "Windows PDF Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10.
Applies to:
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5610
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5610
CVE-2018-8398
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8394, CVE-2018-8396.
Applies to:
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5611
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5611
CVE-2018-8394
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8396, CVE-2018-8398.
Applies to:
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5613
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5613
CVE-2018-8396
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8394, CVE-2018-8398.
Applies to:
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5616
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5616
CVE-2018-8372
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5617
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5617
CVE-2018-8373
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5618
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5618
CVE-2018-8353
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5619
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5619
CVE-2018-8355
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8353, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5620
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5620
CVE-2018-8371
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5621
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5621
CVE-2018-8390
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389.
Applies to:
Microsoft Edge
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5622
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5622
CVE-2018-8389
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8390.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5623
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5623
CVE-2018-8359
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8385, CVE-2018-8389, CVE-2018-8390.
Applies to:
Microsoft Edge
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5624
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5624
CVE-2018-8385
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8353, CVE-2018-8355, CVE-2018-8359, CVE-2018-8371, CVE-2018-8372, CVE-2018-8373, CVE-2018-8389, CVE-2018-8390.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5607
Title:
OpenType Font Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5607
CVE-2018-8344
Severity:
High
Description:
The Windows Adobe Type Manager Font Driver (Atmfd.dll) in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 and R2 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "OpenType Font Driver Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5656
Title:
Microsoft SQL Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5656
CVE-2018-8273
Severity:
High
Description:
A buffer overflow vulnerability exists in the Microsoft SQL Server that could allow remote code execution on an affected system, aka "Microsoft SQL Server Remote Code Execution Vulnerability." This affects Microsoft SQL Server.
Applies to:
Microsoft SQL Server 2016
Microsoft SQL Server 2017
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5638
Title:
Microsoft PowerPoint Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5638
CVE-2018-8376
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka "Microsoft PowerPoint Remote Code Execution Vulnerability." This affects Microsoft PowerPoint.
Applies to:
Microsoft PowerPoint 2010
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5639
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5639
CVE-2018-8378
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory, aka "Microsoft Office Information Disclosure Vulnerability." This affects Word, Microsoft SharePoint Server, Microsoft Office Word Viewer, Microsoft Excel Viewer, Microsoft SharePoint, Microsoft Office.
Applies to:
Microsoft Office 2003
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5654
Title:
Microsoft Exchange Server Tampering Vulnerability
Type:
Software
Bulletins:
CISEC:5654
CVE-2018-8374
Severity:
Medium
Description:
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server.
Applies to:
Microsoft Exchange Server 2010
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5651
Title:
Microsoft Exchange Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5651
CVE-2018-8302
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka "Microsoft Exchange Memory Corruption Vulnerability." This affects Microsoft Exchange Server.
Applies to:
Microsoft Exchange Server 2010
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5625
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5625
CVE-2018-8379
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel. This CVE ID is unique from CVE-2018-8375.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2010
Microsoft Office 2016
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5627
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5627
CVE-2018-8375
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel Viewer, Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-8379.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2010
Microsoft Office 2016
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5626
Title:
Microsoft Excel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5626
CVE-2018-8382
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka "Microsoft Excel Information Disclosure Vulnerability." This affects Microsoft Excel Viewer, Microsoft Office, Microsoft Excel.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2010
Microsoft Office 2016
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5614
Title:
Microsoft COM for Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5614
CVE-2018-8349
Severity:
High
Description:
A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5609
Title:
Microsoft Browser Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5609
CVE-2018-8403
Severity:
High
Description:
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability." This affects Internet Explorer 11, Microsoft Edge, Internet Explorer 10.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5606
Title:
Microsoft Browser Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5606
CVE-2018-8351
Severity:
Medium
Description:
An information disclosure vulnerability exists when affected Microsoft browsers improperly allow cross-frame interaction, aka "Microsoft Browser Information Disclosure Vulnerability." This affects Internet Explorer 11, Microsoft Edge, Internet Explorer 10.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5608
Title:
Microsoft Browser Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5608
CVE-2018-8357
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Microsoft browsers allowing sandbox escape, aka "Microsoft Browser Elevation of Privilege Vulnerability." This affects Internet Explorer 11, Microsoft Edge.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5612
Title:
GDI+ Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5612
CVE-2018-8397
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory, aka "GDI+ Remote Code Execution Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.
Applies to:
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5629
Title:
Adobe Acrobat and Reader versions 2018.011.20055 and earlier, 2017.011.30096 and earlier, and 2015.006.30434 and earlier have an untrusted pointer dereference vulnerability
Type:
Software
Bulletins:
CISEC:5629
CVE-2018-12799
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20055 and earlier, 2017.011.30096 and earlier, and 2015.006.30434 and earlier have an untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5628
Title:
Adobe Acrobat and Reader versions 2018.011.20055 and earlier, 2017.011.30096 and earlier, and 2015.006.30434 and earlier have an out-of-bounds write vulnerability
Type:
Software
Bulletins:
CISEC:5628
CVE-2018-12808
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20055 and earlier, 2017.011.30096 and earlier, and 2015.006.30434 and earlier have an out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5632
Title:
.NET Framework Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5632
CVE-2018-8360
Severity:
Medium
Description:
An information disclosure vulnerability exists in Microsoft .NET Framework that could allow an attacker to access information in multi-tenant environments, aka ".NET Framework Information Disclosure Vulnerability." This affects Microsoft .NET Framework 4.7/4.7.1/4.7.2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.0, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2, Microsoft .NET Framework 4.7.1/4.7.2, Microsoft .NET Framework 4.7.2, Microsoft .NET Framework 2.0, Microsoft .NET Framework 4.6/4.6.1/4.6.2.
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.7
Created:
2018-10-05
Updated:
2024-01-17

ID:
CISEC:5588
Title:
Internet Explorer Remote Code Execution Vulnerability
Type:
Web
Bulletins:
CISEC:5588
CVE-2018-8316
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly validates hyperlinks before loading executable libraries, aka "Internet Explorer Remote Code Execution Vulnerability." This affects Internet Explorer 11, Internet Explorer 10.
Applies to:
Internet Explorer
Created:
2018-09-28
Updated:
2024-01-17

ID:
CISEC:5602
Title:
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5602
CVE-2018-8406
Severity:
High
Description:
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8400, CVE-2018-8401, CVE-2018-8405.
Applies to:
Created:
2018-09-28
Updated:
2024-01-17

ID:
CISEC:5603
Title:
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5603
CVE-2018-8400
Severity:
High
Description:
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows 10 Servers, Windows 10. This CVE ID is unique from CVE-2018-8401, CVE-2018-8405, CVE-2018-8406.
Applies to:
Created:
2018-09-28
Updated:
2024-01-17

ID:
CISEC:5604
Title:
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5604
CVE-2018-8401
Severity:
High
Description:
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8400, CVE-2018-8405, CVE-2018-8406.
Applies to:
Created:
2018-09-28
Updated:
2024-01-17

ID:
CISEC:5605
Title:
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5605
CVE-2018-8405
Severity:
High
Description:
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8400, CVE-2018-8401, CVE-2018-8406.
Applies to:
Created:
2018-09-28
Updated:
2024-01-17

ID:
CISEC:5582
Title:
Windows NDIS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5582
CVE-2018-8342
Severity:
High
Description:
An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it, aka "Windows NDIS Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8343.
Applies to:
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5583
Title:
Windows NDIS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5583
CVE-2018-8343
Severity:
High
Description:
An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it, aka "Windows NDIS Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8342.
Applies to:
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5572
Title:
Microsoft Edge Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:5572
CVE-2018-8383
Severity:
Medium
Description:
A spoofing vulnerability exists when Microsoft Edge does not properly parse HTTP content, aka "Microsoft Edge Spoofing Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8388.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5575
Title:
Microsoft Edge Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:5575
CVE-2018-8388
Severity:
Medium
Description:
A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content, aka "Microsoft Edge Spoofing Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8383.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5578
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5578
CVE-2018-8358
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Microsoft Edge improperly handles redirect requests, aka "Microsoft Edge Security Feature Bypass Vulnerability." This affects Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5579
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5579
CVE-2018-8387
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8377.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5581
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5581
CVE-2018-8377
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8387.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5580
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5580
CVE-2018-8370
Severity:
Medium
Description:
A information disclosure vulnerability exists when WebAudio Library improperly handles audio requests, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5586
Title:
LNK Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5586
CVE-2018-8346
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed, aka "LNK Remote Code Execution Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8345.
Applies to:
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5587
Title:
LNK Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5587
CVE-2018-8345
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed, aka "LNK Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8346.
Applies to:
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5573
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5573
CVE-2018-8381
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8266, CVE-2018-8380, CVE-2018-8384.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5574
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5574
CVE-2018-8384
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8266, CVE-2018-8380, CVE-2018-8381.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5576
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5576
CVE-2018-8380
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8266, CVE-2018-8381, CVE-2018-8384.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5577
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5577
CVE-2018-8266
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8380, CVE-2018-8381, CVE-2018-8384.
Applies to:
Microsoft Edge
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5584
Title:
AD FS Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5584
CVE-2018-8340
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Active Directory Federation Services (AD FS) improperly handles multi-factor authentication requests, aka "AD FS Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows Server 2012 R2, Windows 10 Servers.
Applies to:
Created:
2018-09-21
Updated:
2024-01-17

ID:
CISEC:5569
Title:
Windows Shell Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5569
CVE-2018-8414
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows 10 Servers, Windows 10.
Applies to:
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5516
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5516
CVE-2018-8341
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8348.
Applies to:
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5517
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5517
CVE-2018-8348
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8341.
Applies to:
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5518
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5518
CVE-2018-8347
Severity:
High
Description:
An elevation of privilege vulnerability exists in Microsoft Windows when the Windows kernel fails to properly handle parsing of certain symbolic links, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5566
Title:
Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5566
CVE-2018-8339
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior, aka "Windows Installer Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5571
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5571
CVE-2018-8404
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8399.
Applies to:
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5568
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5568
CVE-2018-8399
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 10 Servers, Windows 10. This CVE ID is unique from CVE-2018-8404.
Applies to:
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5489
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5489
CVE-2018-12797
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5490
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5490
CVE-2018-12756
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5491
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5491
CVE-2018-12773
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5492
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5492
CVE-2018-12791
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5493
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5493
CVE-2018-12776
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5494
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5494
CVE-2018-12796
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5495
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5495
CVE-2018-5011
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5496
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5496
CVE-2018-12772
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5497
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5497
CVE-2018-12792
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5498
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5498
CVE-2018-5065
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5499
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5499
CVE-2018-12783
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5500
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5500
CVE-2018-12770
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5501
Title:
Use-after-free Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5501
CVE-2018-5009
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5419
Title:
Untrusted Pointer Dereference Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5419
CVE-2018-5012
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5421
Title:
Untrusted Pointer Dereference Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5421
CVE-2018-5030
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5418
Title:
Type Confusion Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5418
CVE-2018-5057
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5420
Title:
Type Confusion Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5420
CVE-2018-12794
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5422
Title:
Type Confusion Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5422
CVE-2018-12793
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5415
Title:
Security Bypass Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5415
CVE-2018-12802
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Security Bypass vulnerability. Successful exploitation could lead to privilege escalation.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5473
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5473
CVE-2018-12771
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5474
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5474
CVE-2018-5069
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5475
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5475
CVE-2018-12760
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5476
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5476
CVE-2018-5042
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5478
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5478
CVE-2018-12755
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5479
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5479
CVE-2018-5064
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5480
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5480
CVE-2018-5021
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5481
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5481
CVE-2018-5020
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5484
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5484
CVE-2018-5059
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5485
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5485
CVE-2018-12758
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5486
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5486
CVE-2018-12787
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5488
Title:
Out-of-bounds Write Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5488
CVE-2018-5070
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5423
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5423
CVE-2018-5017
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5424
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5424
CVE-2018-5010
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5425
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5425
CVE-2018-5014
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5426
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5426
CVE-2018-5016
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5427
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5427
CVE-2018-12803
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5428
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5428
CVE-2018-5024
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5429
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5429
CVE-2018-5029
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5430
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5430
CVE-2018-5031
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5431
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5431
CVE-2018-5046
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5432
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5432
CVE-2018-5018
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5433
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5433
CVE-2018-5025
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5434
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5434
CVE-2018-5023
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5435
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5435
CVE-2018-5033
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5436
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5436
CVE-2018-5035
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5437
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5437
CVE-2018-5044
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5438
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5438
CVE-2018-5026
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5439
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5439
CVE-2018-5027
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5440
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5440
CVE-2018-5019
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5441
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5441
CVE-2018-5022
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5442
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5442
CVE-2018-5039
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5443
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5443
CVE-2018-5068
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5444
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5444
CVE-2018-5053
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5445
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5445
CVE-2018-5056
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5446
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5446
CVE-2018-5063
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5447
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5447
CVE-2018-5049
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5448
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5448
CVE-2018-5050
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5449
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5449
CVE-2018-5051
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5450
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5450
CVE-2018-5061
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5451
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5451
CVE-2018-5054
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5452
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5452
CVE-2018-5047
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5453
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5453
CVE-2018-5055
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5454
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5454
CVE-2018-5066
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5455
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5455
CVE-2018-5062
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5456
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5456
CVE-2018-5060
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5457
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5457
CVE-2018-5048
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5458
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5458
CVE-2018-12757
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5459
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5459
CVE-2018-12786
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5460
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5460
CVE-2018-12768
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5461
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5461
CVE-2018-12777
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5462
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5462
CVE-2018-12774
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5463
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5463
CVE-2018-12761
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5464
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5464
CVE-2018-12781
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5465
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5465
CVE-2018-12764
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5466
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5466
CVE-2018-12765
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5467
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5467
CVE-2018-12780
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5468
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5468
CVE-2018-12766
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5469
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5469
CVE-2018-12763
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5470
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5470
CVE-2018-12779
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5471
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5471
CVE-2018-12762
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5472
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5472
CVE-2018-12767
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5477
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5477
CVE-2018-12795
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5482
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5482
CVE-2018-12754
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5483
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5483
CVE-2018-12790
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5487
Title:
Out-of-bounds Read Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5487
CVE-2018-12789
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5508
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5508
CVE-2018-12798
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5509
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5509
CVE-2018-5058
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5510
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5510
CVE-2018-12788
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5511
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5511
CVE-2018-5015
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5512
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5512
CVE-2018-5038
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5502
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5502
CVE-2018-5032
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5503
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5503
CVE-2018-5045
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5504
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5504
CVE-2018-5036
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5505
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5505
CVE-2018-5052
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5506
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5506
CVE-2018-5041
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5507
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5507
CVE-2018-5028
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5513
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5513
CVE-2018-5067
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5514
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5514
CVE-2018-5040
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5515
Title:
Heap Overflow Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5515
CVE-2018-12785
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5414
Title:
Double Free Vulnerability in Adobe Acrobat Reader 2018.011.20055 and earlier versions, 2017.011.30096 and earlier versions, and 2015.006.30434 and earlier versions
Type:
Software
Bulletins:
CISEC:5414
CVE-2018-12782
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5570
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5570
CVE-2018-8200
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8204.
Applies to:
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5567
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5567
CVE-2018-8204
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8200.
Applies to:
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5411
Title:
Buffer Errors Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5411
CVE-2018-12784
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Buffer Errors vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5412
Title:
Buffer Errors Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5412
CVE-2018-5037
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Buffer Errors vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5413
Title:
Buffer Errors Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5413
CVE-2018-5043
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Buffer Errors vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5416
Title:
Buffer Errors Vulnerability in Adobe Acrobat Reader 2018.011.20040 and earlier versions, 2017.011.30080 and earlier versions, and 2015.006.30418 and earlier versions
Type:
Software
Bulletins:
CISEC:5416
CVE-2018-5034
Severity:
Medium
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Buffer Errors vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5553
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an XFA '\n' POST injection vulnerability
Type:
Software
Bulletins:
CISEC:5553
CVE-2018-4995
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an XFA '\n' POST injection vulnerability. Successful exploitation could lead to a security bypass.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5538
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Untrusted pointer dereference vulnerability
Type:
Software
Bulletins:
CISEC:5538
CVE-2018-4987
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Untrusted pointer dereference vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5519
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5519
CVE-2018-4967
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5524
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5524
CVE-2018-4956
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5529
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5529
CVE-2018-4963
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5531
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5531
CVE-2018-4970
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5534
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5534
CVE-2018-4986
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5539
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5539
CVE-2018-4969
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5541
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5541
CVE-2018-4949
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5542
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5542
CVE-2018-4957
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5544
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5544
CVE-2018-4964
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5547
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5547
CVE-2018-4973
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5549
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5549
CVE-2018-4960
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5552
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5552
CVE-2018-4975
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5556
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5556
CVE-2018-4972
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5558
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5558
CVE-2018-4981
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5560
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5560
CVE-2018-4962
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5561
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5561
CVE-2018-4976
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5562
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5562
CVE-2018-4955
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5563
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5563
CVE-2018-4951
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5564
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability
Type:
Software
Bulletins:
CISEC:5564
CVE-2018-4985
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5545
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an NTLM SSO hash theft vulnerability
Type:
Software
Bulletins:
CISEC:5545
CVE-2018-4993
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have an NTLM SSO hash theft vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5522
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5522
CVE-2018-4959
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5527
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5527
CVE-2018-4980
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5528
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5528
CVE-2018-4996
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5530
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5530
CVE-2018-4958
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5532
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5532
CVE-2018-4974
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5533
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5533
CVE-2018-4983
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5535
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5535
CVE-2018-4977
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5536
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5536
CVE-2018-4989
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5548
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5548
CVE-2018-4971
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5551
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5551
CVE-2018-4954
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5554
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5554
CVE-2018-4952
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5555
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5555
CVE-2018-4961
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5557
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5557
CVE-2018-4988
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5550
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Type Confusion vulnerability
Type:
Software
Bulletins:
CISEC:5550
CVE-2018-4953
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5525
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Security Bypass vulnerability
Type:
Software
Bulletins:
CISEC:5525
CVE-2018-4979
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Security Bypass vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5537
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Memory Corruption vulnerability
Type:
Software
Bulletins:
CISEC:5537
CVE-2018-4965
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Memory Corruption vulnerability. Successful exploitation could lead to information disclosure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5520
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability
Type:
Software
Bulletins:
CISEC:5520
CVE-2018-4978
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5521
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability
Type:
Software
Bulletins:
CISEC:5521
CVE-2018-4948
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5523
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability
Type:
Software
Bulletins:
CISEC:5523
CVE-2018-4966
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5526
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability
Type:
Software
Bulletins:
CISEC:5526
CVE-2018-4982
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5546
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability
Type:
Software
Bulletins:
CISEC:5546
CVE-2018-4947
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5559
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability
Type:
Software
Bulletins:
CISEC:5559
CVE-2018-4968
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5565
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability
Type:
Software
Bulletins:
CISEC:5565
CVE-2018-4984
Severity:
High
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Heap Overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5417
Title:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Double Free vulnerability
Type:
Software
Bulletins:
CISEC:5417
CVE-2018-4990
Severity:
Medium
Description:
Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Double Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5543
Title:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability
Type:
Software
Bulletins:
CISEC:5543
CVE-2018-12815
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20040 and earlier, 2017.011.30080 and earlier, and 2015.006.30418 and earlier versions have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
CISEC:5540
Title:
Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions have a Type Confusion vulnerability
Type:
Software
Bulletins:
CISEC:5540
CVE-2018-12812
Severity:
High
Description:
Adobe Acrobat and Reader 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-09-14
Updated:
2024-01-17

ID:
MITRE:61
Title:
Windows NT Remote Access Service Phonebook Buffer Overflow
Type:
Services
Bulletins:
MITRE:61
CVE-2002-0366
Severity:
High
Description:
Buffer overflow in Remote Access Service (RAS) phonebook for Windows NT 4.0, 2000, XP, and Routing and Remote Access Server (RRAS) allows local users to execute arbitrary code by modifying the rasphone.pbk file to use a long dial-up entry.
Applies to:
Remote Access Service (RAS)
Created:
2018-09-11
Updated:
2024-01-17

ID:
MITRE:158
Title:
Windows NT Process Handle Duplication Privilege Escalation
Type:
Miscellaneous
Bulletins:
MITRE:158
CVE-2002-0367
Severity:
High
Description:
smss.exe debugging subsystem in Windows NT and Windows 2000 does not properly authenticate programs that connect to other programs, which allows local users to gain administrator or SYSTEM privileges by duplicating a handle to a privileged process, as demonstrated by DebPloit.
Applies to:
Windows NT 4.0
Created:
2018-09-11
Updated:
2024-01-17

ID:
MITRE:94
Title:
Solaris 8 mibiisa Remote Buffer Overflow Vulnerability
Type:
Services
Bulletins:
MITRE:94
CVE-2002-0797
Severity:
High
Description:
Buffer overflow in the MIB parsing component of mibiisa for Solaris 5.6 through 8 allows remote attackers to gain root privileges.
Applies to:
mibiisa
Created:
2018-09-11
Updated:
2024-01-17

ID:
MITRE:179
Title:
Solaris 7 LBXProxy Display Name Buffer Overflow
Type:
Services
Bulletins:
MITRE:179
CVE-2002-0090
Severity:
High
Description:
Buffer overflow in Low BandWidth X proxy (lbxproxy) in Solaris 8 allows local users to execute arbitrary code via a long display command line option.
Applies to:
lbxproxy
Created:
2018-09-11
Updated:
2024-01-17

ID:
MITRE:10
Title:
Heap Overflow in Solaris 8 xlock
Type:
Software
Bulletins:
MITRE:10
CVE-2001-0652
Severity:
High
Description:
Heap overflow in xlock in Solaris 2.6 through 8 allows local users to gain root privileges via a long (1) XFILESEARCHPATH or (2) XUSERFILESEARCHPATH environmental variable.
Applies to:
xlock
Created:
2018-09-11
Updated:
2024-01-17

ID:
CISEC:5394
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5394
CVE-2018-8312
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Access fails to properly handle objects in memory, aka "Microsoft Access Remote Code Execution Vulnerability." This affects Microsoft Access, Microsoft Office.
Applies to:
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5368
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Shell: Core / Client
Type:
Software
Bulletins:
CISEC:5368
CVE-2018-3084
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Shell: Core / Client). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of MySQL Server.
Applies to:
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5356
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles
Type:
Software
Bulletins:
CISEC:5356
CVE-2018-3074
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Roles). Supported versions that are affected are 8.0.11 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5364
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges
Type:
Software
Bulletins:
CISEC:5364
CVE-2018-3063
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.5.60 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5371
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges
Type:
Software
Bulletins:
CISEC:5371
CVE-2018-3056
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data.
Applies to:
MySQL Server 5.7
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5379
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges
Type:
Software
Bulletins:
CISEC:5379
CVE-2018-3075
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Privileges). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5372
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption
Type:
Software
Bulletins:
CISEC:5372
CVE-2018-2767
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Security: Encryption). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5333
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication
Type:
Software
Bulletins:
CISEC:5333
CVE-2018-2755
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5360
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication
Type:
Software
Bulletins:
CISEC:5360
CVE-2018-3067
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5361
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options
Type:
Software
Bulletins:
CISEC:5361
CVE-2018-3066
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Options). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data as well as unauthorized read access to a subset of MySQL Server accessible data.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5337
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:5337
CVE-2018-2781
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5380
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:5380
CVE-2018-3073
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5374
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached
Type:
Software
Bulletins:
CISEC:5374
CVE-2018-3062
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Memcached). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows low privileged attacker with network access via memcached to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5359
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML
Type:
Software
Bulletins:
CISEC:5359
CVE-2018-3065
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5369
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML
Type:
Software
Bulletins:
CISEC:5369
CVE-2018-3061
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5339
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:5339
CVE-2018-2817
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5346
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:5346
CVE-2018-2813
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5357
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:5357
CVE-2018-3082
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized read access to a subset of MySQL Server accessible data.
Applies to:
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5358
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:5358
CVE-2018-3077
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5363
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:5363
CVE-2018-3080
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5370
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:5370
CVE-2018-3054
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5375
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:5375
CVE-2018-3078
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5341
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges
Type:
Software
Bulletins:
CISEC:5341
CVE-2018-2818
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5345
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges
Type:
Software
Bulletins:
CISEC:5345
CVE-2018-2758
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5373
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM
Type:
Software
Bulletins:
CISEC:5373
CVE-2018-3058
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: MyISAM). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of MySQL Server accessible data.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5334
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5334
CVE-2018-2782
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5335
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5335
CVE-2018-2784
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5338
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5338
CVE-2018-2819
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5342
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5342
CVE-2018-2766
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5347
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5347
CVE-2018-2787
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.39 and prior and 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5366
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5366
CVE-2018-3064
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
Applies to:
MySQL Server 5.6
MySQL Server 5.7
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5367
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5367
CVE-2018-3079
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5376
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5376
CVE-2018-3060
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.22 and prior and 8.0.11 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5340
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: GIS Extension
Type:
Software
Bulletins:
CISEC:5340
CVE-2018-2805
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: GIS Extension). Supported versions that are affected are 5.6.39 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.0 Base Score 6.5 (Availability impacts).
Applies to:
MySQL Server 5.6
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5336
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs
Type:
Software
Bulletins:
CISEC:5336
CVE-2018-2761
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5343
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs
Type:
Software
Bulletins:
CISEC:5343
CVE-2018-2773
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5365
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump
Type:
Software
Bulletins:
CISEC:5365
CVE-2018-3070
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Client mysqldump). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior and 5.7.22 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5381
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Audit Log
Type:
Software
Bulletins:
CISEC:5381
CVE-2018-3071
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Audit Log). Supported versions that are affected are 5.7.22 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5362
Title:
Vulnerability in the MySQL Server 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior
Type:
Software
Bulletins:
CISEC:5362
CVE-2018-0739
Severity:
Medium
Description:
Constructed ASN.1 types with a recursive definition (such as can be found in PKCS7) could eventually exceed the stack given malicious input with excessive recursion. This could result in a Denial Of Service attack. There are no such structures used within SSL/TLS that come from untrusted sources so this is considered safe. Fixed in OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o (Affected 1.0.2b-1.0.2n).
Applies to:
MySQL Server 5.6
MySQL Server 5.7
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5344
Title:
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: ndbcluster/plugin
Type:
Software
Bulletins:
CISEC:5344
CVE-2018-2877
Severity:
Low
Description:
Vulnerability in the MySQL Cluster component of Oracle MySQL (subcomponent: Cluster: ndbcluster/plugin). Supported versions that are affected are 7.2.27 and prior, 7.3.16 and prior, 7.4.14 and prior and 7.5.5 and prior. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where MySQL Cluster executes to compromise MySQL Cluster. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Cluster.
Applies to:
MySQL Cluster 7.2
MySQL Cluster 7.3
MySQL Cluster 7.4
MySQL Cluster 7.5
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5378
Title:
Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs
Type:
Software
Bulletins:
CISEC:5378
CVE-2018-3081
Severity:
Medium
Description:
Vulnerability in the MySQL Client component of Oracle MySQL (subcomponent: Client programs). Supported versions that are affected are 5.5.60 and prior, 5.6.40 and prior, 5.7.22 and prior and 8.0.11 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Client. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Client as well as unauthorized update, insert or delete access to some of MySQL Client accessible data.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
MySQL Server 8.0
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5350
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency
Type:
Software
Bulletins:
CISEC:5350
CVE-2018-2952
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171; JRockit: R28.3.18. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
JRockit
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5353
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries
Type:
Software
Bulletins:
CISEC:5353
CVE-2018-2940
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
Applies to:
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5351
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE
Type:
Software
Bulletins:
CISEC:5351
CVE-2018-2973
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JSSE). Supported versions that are affected are Java SE: 6u191, 7u181, 8u172 and 10.0.1; Java SE Embedded: 8u171. Difficult to exploit vulnerability allows unauthenticated attacker with network access via SSL/TLS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
Applies to:
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5354
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Windows DLL
Type:
Software
Bulletins:
CISEC:5354
CVE-2018-2942
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Windows DLL). Supported versions that are affected are Java SE: 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5349
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security
Type:
Software
Bulletins:
CISEC:5349
CVE-2018-2972
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Security). The supported version that is affected is Java SE: 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
Java Development Kit 10
Java Runtime Environment 10
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5348
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX
Type:
Software
Bulletins:
CISEC:5348
CVE-2018-2941
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u181, 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
Applies to:
Java Development Kit 10
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5355
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB
Type:
Software
Bulletins:
CISEC:5355
CVE-2018-2938
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Java DB). Supported versions that are affected are Java SE: 6u191, 7u181 and 8u172. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. While the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVE-2018-2938 addresses CVE-2018-1313.
Applies to:
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5352
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment
Type:
Software
Bulletins:
CISEC:5352
CVE-2018-2964
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u172 and 10.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
Applies to:
Java Development Kit 10
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 8
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5382
Title:
Skype for Business and Lync Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5382
CVE-2018-8238
Severity:
High
Description:
A security feature bypass vulnerability exists when Skype for Business or Lync do not properly parse UNC path links shared via messages, aka "Skype for Business and Lync Security Feature Bypass Vulnerability." This affects Skype, Microsoft Lync.
Applies to:
Created:
2018-09-07
Updated:
2024-01-17

ID:
CISEC:5290
Title:
WordPad Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5290
CVE-2018-8307
Severity:
Medium
Description:
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Excel Viewer, Microsoft PowerPoint Viewer, Microsoft Office, Microsoft Office Word Viewer.
Applies to:
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5332
Title:
Windows Firewall Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5332
CVE-2018-8206
Severity:
High
Description:
A denial of service vulnerability exists when Windows improperly handles File Transfer Protocol (FTP) connections, aka "Windows FTP Server Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5330
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5330
CVE-2018-8314
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Windows fails a check, allowing a sandbox escape, aka "Windows Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2008 R2, Windows 10. This CVE ID is unique from CVE-2018-8313.
Applies to:
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5327
Title:
Windows DNSAPI Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5327
CVE-2018-8304
Severity:
High
Description:
A denial of service vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails to properly handle DNS responses, aka "Windows DNSAPI Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5328
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5328
CVE-2018-8309
Severity:
Medium
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory, aka "Windows Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5331
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5331
CVE-2018-8313
Severity:
High
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8314.
Applies to:
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5326
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth
Type:
Software
Bulletins:
CISEC:5326
CVE-2018-2769
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Pluggable Auth). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5311
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema
Type:
Software
Bulletins:
CISEC:5311
CVE-2018-2846
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5302
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:5302
CVE-2018-2778
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5306
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:5306
CVE-2018-2780
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5313
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:5313
CVE-2018-2812
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5315
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:5315
CVE-2018-2775
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5317
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:5317
CVE-2018-2779
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5324
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:5324
CVE-2018-2816
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5320
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking
Type:
Software
Bulletins:
CISEC:5320
CVE-2018-2771
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Locking). Supported versions that are affected are 5.5.59 and prior, 5.6.39 and prior and 5.7.21 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5325
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML
Type:
Software
Bulletins:
CISEC:5325
CVE-2018-2839
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5299
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection
Type:
Software
Bulletins:
CISEC:5299
CVE-2018-2762
Severity:
Low
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Connection). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where MySQL Server executes to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5298
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5298
CVE-2018-2759
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5300
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5300
CVE-2018-2810
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5308
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5308
CVE-2018-2786
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5309
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:5309
CVE-2018-2777
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5307
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Group Replication GCS
Type:
Software
Bulletins:
CISEC:5307
CVE-2018-2776
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Group Replication GCS). Supported versions that are affected are 5.7.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via XCom to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server 5.7
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5303
Title:
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security
Type:
Software
Bulletins:
CISEC:5303
CVE-2018-2794
Severity:
Low
Description:
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162, 10 and JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, JRockit executes to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
JRockit
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5314
Title:
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI
Type:
Software
Bulletins:
CISEC:5314
CVE-2018-2800
Severity:
Medium
Description:
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: RMI). Supported versions that are affected are Java SE: 6u181, 7u171 and 8u162; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, JRockit accessible data as well as unauthorized read access to a subset of Java SE, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service.
Applies to:
JRockit
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5312
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization
Type:
Software
Bulletins:
CISEC:5312
CVE-2018-2815
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
JRockit
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5316
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security
Type:
Software
Bulletins:
CISEC:5316
CVE-2018-2795
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
JRockit
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5321
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security
Type:
Software
Bulletins:
CISEC:5321
CVE-2018-2783
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u161 and 8u152; Java SE Embedded: 8u152; JRockit: R28.3.17. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
JRockit
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5301
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX
Type:
Software
Bulletins:
CISEC:5301
CVE-2018-2797
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
JRockit
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5310
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP
Type:
Software
Bulletins:
CISEC:5310
CVE-2018-2799
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JAXP). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
JRockit
Java Development Kit 10
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5304
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency
Type:
Software
Bulletins:
CISEC:5304
CVE-2018-2796
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Concurrency). Supported versions that are affected are Java SE: 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
JRockit
Java Development Kit 10
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5297
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT
Type:
Software
Bulletins:
CISEC:5297
CVE-2018-2798
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161; JRockit: R28.3.17. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service.
Applies to:
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5305
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security
Type:
Software
Bulletins:
CISEC:5305
CVE-2018-2790
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Security). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
Applies to:
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5319
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot
Type:
Software
Bulletins:
CISEC:5319
CVE-2018-2814
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 6u181, 7u171, 8u162 and 10; Java SE Embedded: 8u161. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
Applies to:
Java Development Kit 10
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5322
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries
Type:
Software
Bulletins:
CISEC:5322
CVE-2018-2826
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
Applies to:
Java Development Kit 10
Java Runtime Environment 10
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5323
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries
Type:
Software
Bulletins:
CISEC:5323
CVE-2018-2825
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Libraries). The supported version that is affected is Java SE: 10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
Applies to:
Java Development Kit 10
Java Runtime Environment 10
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5318
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install
Type:
Software
Bulletins:
CISEC:5318
CVE-2018-2811
Severity:
Low
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Install). Supported versions that are affected are Java SE: 8u162 and 10. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: Applies to installation process on client deployment of Java.
Applies to:
JRockit
Java Development Kit 10
Java Development Kit 8
Java Runtime Environment 10
Java Runtime Environment 8
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5329
Title:
Remote Code Execution Vulnerability in Skype For Business and Lync
Type:
Software
Bulletins:
CISEC:5329
CVE-2018-8311
Severity:
Medium
Description:
A remote code execution vulnerability exists when Skype for Business and Microsoft Lync clients fail to properly sanitize specially crafted content, aka "Remote Code Execution Vulnerability in Skype For Business and Lync." This affects Skype, Microsoft Lync.
Applies to:
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5294
Title:
Microsoft SharePoint Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5294
CVE-2018-8300
Severity:
Medium
Description:
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka "Microsoft SharePoint Remote Code Execution Vulnerability." This affects Microsoft SharePoint.
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5292
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5292
CVE-2018-8323
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8323.
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5293
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5293
CVE-2018-8299
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8323.
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5289
Title:
Microsoft Office Tampering Vulnerability
Type:
Software
Bulletins:
CISEC:5289
CVE-2018-8310
Severity:
Medium
Description:
A tampering vulnerability exists when Microsoft Outlook does not properly handle specific attachment types when rendering HTML emails, aka "Microsoft Office Tampering Vulnerability." This affects Microsoft Word, Microsoft Office.
Applies to:
Microsoft Office 2010
Microsoft Office 2016
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5291
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5291
CVE-2018-8222
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-31
Updated:
2024-01-17

ID:
CISEC:5284
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5284
CVE-2018-8308
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5278
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5278
CVE-2018-8282
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5281
Title:
Scripting Engine Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5281
CVE-2018-8276
Severity:
Medium
Description:
A security feature bypass vulnerability exists in the Microsoft Chakra scripting engine that allows Control Flow Guard (CFG) to be bypassed, aka "Scripting Engine Security Feature Bypass Vulnerability." This affects Microsoft Edge, ChakraCore.
Applies to:
Microsoft Edge
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5286
Title:
Python Integer Overflow vulnerability
Type:
Software
Bulletins:
CISEC:5286
CVE-2017-1000158
Severity:
High
Description:
CPython (aka Python) up to 2.7.13 is vulnerable to an integer overflow in the PyString_DecodeEscape function in stringobject.c, resulting in heap-based buffer overflow (and possible arbitrary code execution).
Applies to:
Python
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5288
Title:
Python Heap-Buffer-Overflow vulnerability
Type:
Software
Bulletins:
CISEC:5288
CVE-2018-1000030
Severity:
Low
Description:
Python 2.7.14 is vulnerable to a Heap-Buffer-Overflow as well as a Heap-Use-After-Free. Python versions prior to 2.7.14 may also be vulnerable and it appears that Python 2.7.17 and prior may also be vulnerable however this has not been confirmed. The vulnerability lies when multiply threads are handling large amounts of data. In both cases there is essentially a race condition that occurs. For the Heap-Buffer-Overflow, Thread 2 is creating the size for a buffer, but Thread1 is already writing to the buffer without knowing how much to write. So when a large amount of data is being processed, it is very easy to cause memory corruption using a Heap-Buffer-Overflow. As for the Use-After-Free, Thread3->Malloc->Thread1->Free's->Thread2-Re-uses-Free'd Memory. The PSRT has stated that this is not a security vulnerability due to the fact that the attacker must be able to run code, however in some situations, such as function as a service, this vulnerability can potentially be used by an attacker to violate a trust boundary, as such the DWF feels this issue deserves a CVE.
Applies to:
Python
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5279
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5279
CVE-2018-8290
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8286, CVE-2018-8294.
Applies to:
Microsoft Edge
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5280
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5280
CVE-2018-8294
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8286, CVE-2018-8290.
Applies to:
Microsoft Edge
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5282
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5282
CVE-2018-8280
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8286, CVE-2018-8290, CVE-2018-8294.
Applies to:
Microsoft Edge
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5283
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5283
CVE-2018-8286
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8280, CVE-2018-8290, CVE-2018-8294.
Applies to:
Microsoft Edge
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5285
Title:
Buffer overflow vulnerability in os.symlink on Windows
Type:
Software
Bulletins:
CISEC:5285
CVE-2018-1000117
Severity:
High
Description:
Python Software Foundation CPython version From 3.2 until 3.6.4 on Windows contains a Buffer Overflow vulnerability in os.symlink() function on Windows that can result in Arbitrary code execution, likely escalation of privilege. This attack appears to be exploitable via a python script that creates a symlink with an attacker controlled name or location. This vulnerability appears to have been fixed in 3.7.0 and 3.6.5.
Applies to:
Python
Created:
2018-08-24
Updated:
2024-01-17

ID:
CISEC:5236
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5236
CVE-2018-8246
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka "Microsoft Excel Information Disclosure Vulnerability." This affects Microsoft Excel Viewer, Microsoft Office, Microsoft Excel.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2010
Microsoft Office 2016
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5253
Title:
Microsoft Edge Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:5253
CVE-2018-8278
Severity:
Medium
Description:
A spoofing vulnerability exists when Microsoft Edge improperly handles specific HTML content, aka "Microsoft Edge Spoofing Vulnerability." This affects Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5237
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5237
CVE-2018-8125
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8262, CVE-2018-8274, CVE-2018-8275, CVE-2018-8279, CVE-2018-8301.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5238
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5238
CVE-2018-8279
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8125, CVE-2018-8262, CVE-2018-8274, CVE-2018-8275, CVE-2018-8301.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5239
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5239
CVE-2018-8262
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8125, CVE-2018-8274, CVE-2018-8275, CVE-2018-8279, CVE-2018-8301.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5240
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5240
CVE-2018-8274
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8125, CVE-2018-8262, CVE-2018-8275, CVE-2018-8279, CVE-2018-8301.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5241
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5241
CVE-2018-8301
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8125, CVE-2018-8262, CVE-2018-8274, CVE-2018-8275, CVE-2018-8279.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5242
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5242
CVE-2018-8275
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8125, CVE-2018-8262, CVE-2018-8274, CVE-2018-8279, CVE-2018-8301.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5244
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5244
CVE-2018-8291
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8296, CVE-2018-8298.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5245
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5245
CVE-2018-8287
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296, CVE-2018-8298.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5246
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5246
CVE-2018-8242
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296, CVE-2018-8298.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5247
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5247
CVE-2018-8298
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5248
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5248
CVE-2018-8283
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8288, CVE-2018-8291, CVE-2018-8296, CVE-2018-8298.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5249
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5249
CVE-2018-8296
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 11. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8288, CVE-2018-8291, CVE-2018-8298.
Applies to:
Microsoft Internet Explorer 11
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5250
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5250
CVE-2018-8288
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-8242, CVE-2018-8283, CVE-2018-8287, CVE-2018-8291, CVE-2018-8296, CVE-2018-8298.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5251
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5251
CVE-2018-8324
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8289, CVE-2018-8297, CVE-2018-8325.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5252
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5252
CVE-2018-8297
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8289, CVE-2018-8324, CVE-2018-8325.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5254
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5254
CVE-2018-8325
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8289, CVE-2018-8297, CVE-2018-8324.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5255
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5255
CVE-2018-8289
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8297, CVE-2018-8324, CVE-2018-8325.
Applies to:
Microsoft Edge
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5257
Title:
Internet Explorer Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5257
CVE-2018-0949
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Microsoft Internet Explorer improperly handles requests involving UNC resources, aka "Internet Explorer Security Feature Bypass Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5275
Title:
.NET Framework Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5275
CVE-2018-8356
Severity:
Low
Description:
A security feature bypass vulnerability exists when Microsoft .NET Framework components do not correctly validate certificates, aka ".NET Framework Security Feature Bypass Vulnerability." This affects .NET Framework 4.7.2, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, ASP.NET Core 1.1, Microsoft .NET Framework 4.5.2, ASP.NET Core 2.0, ASP.NET Core 1.0, .NET Core 1.1, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, .NET Core 1.0, .NET Core 2.0, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2, Microsoft .NET Framework 4.7.2.
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.7
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5274
Title:
.NET Framework Remote Code Injection Vulnerability
Type:
Software
Bulletins:
CISEC:5274
CVE-2018-8284
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka ".NET Framework Remote Code Injection Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.7.1/4.7.2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2, Microsoft .NET Framework 4.7.2.
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.7
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5277
Title:
.NET Framework Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5277
CVE-2018-8260
Severity:
Medium
Description:
A Remote Code Execution vulnerability exists in .NET software when the software fails to check the source markup of a file, aka ".NET Framework Remote Code Execution Vulnerability." This affects .NET Framework 4.7.2, Microsoft .NET Framework 4.7.2.
Applies to:
Microsoft .NET Framework 4.7
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5276
Title:
.NET Framework Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5276
CVE-2018-8202
Severity:
High
Description:
An elevation of privilege vulnerability exists in .NET Framework which could allow an attacker to elevate their privilege level, aka ".NET Framework Elevation of Privilege Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.7.1/4.7.2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.1/4.7.2, Microsoft .NET Framework 4.7.2.
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.7
Created:
2018-08-17
Updated:
2024-01-17

ID:
CISEC:5235
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5235
CVE-2018-8248
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office.
Applies to:
Microsoft Office 2010
Microsoft Office 2016
Created:
2018-08-10
Updated:
2024-01-17

ID:
CISEC:5234
Title:
Windows Wireless Network Profile Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5234
CVE-2018-8209
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows allows a normal user to access the Wireless LAN profile of an administrative user, aka "Windows Wireless Network Profile Information Disclosure Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5228
Title:
Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5228
CVE-2018-8210
Severity:
High
Description:
A remote code execution vulnerability exists when Windows improperly handles objects in memory, aka "Windows Remote Code Execution Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8213.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5229
Title:
Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5229
CVE-2018-8213
Severity:
High
Description:
A remote code execution vulnerability exists when Windows improperly handles objects in memory, aka "Windows Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8210.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5232
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5232
CVE-2018-8218
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system, aka "Windows Hyper-V Denial of Service Vulnerability." This affects Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5224
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5224
CVE-2018-8239
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka "Windows GDI Information Disclosure Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5231
Title:
Windows DNSAPI Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5231
CVE-2018-8225
Severity:
High
Description:
A remote code execution vulnerability exists in Windows Domain Name System (DNS) DNSAPI.dll when it fails to properly handle DNS responses, aka "Windows DNSAPI Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5222
Title:
Windows Desktop Bridge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5222
CVE-2018-8208
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8214.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5223
Title:
Windows Desktop Bridge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5223
CVE-2018-8214
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows when Desktop Bridge does not properly manage the virtual registry, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8208.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5217
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5217
CVE-2018-8233
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5227
Title:
WEBDAV Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5227
CVE-2018-8175
Severity:
High
Description:
An denial of service vulnerability exists when Windows NT WEBDAV Minirdr attempts to query a WEBDAV directory, aka "WEBDAV Denial of Service Vulnerability." This affects Windows 10 Servers, Windows 10.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5219
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5219
CVE-2018-8254
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft Project Server, Microsoft SharePoint. This CVE ID is unique from CVE-2018-8252.
Applies to:
Microsoft Project Server 2010
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2016
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5220
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5220
CVE-2018-8252
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8254.
Applies to:
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2016
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5226
Title:
Microsoft Publisher Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5226
CVE-2018-8245
Severity:
Medium
Description:
A remote code execution vulnerability exists when Microsoft Publisher fails to utilize features that lock down the Local Machine zone when instantiating OLE objects, aka "Microsoft Publisher Remote Code Execution Vulnerability." This affects Microsoft Publisher.
Applies to:
Microsoft Publisher 2010
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5225
Title:
Microsoft Office Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5225
CVE-2018-8247
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Office Web Apps Server 2013 and Office Online Server fail to properly handle web requests, aka "Microsoft Office Elevation of Privilege Vulnerability." This affects Microsoft Office, Microsoft Office Online Server. This CVE ID is unique from CVE-2018-8245.
Applies to:
Microsoft Office Online Server 2016
Microsoft Office Web Apps Server 2013
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5233
Title:
Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5233
CVE-2018-8251
Severity:
High
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory, aka "Media Foundation Memory Corruption Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5230
Title:
Hypervisor Code Integrity Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5230
CVE-2018-8219
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Windows Hyper-V instruction emulation fails to properly enforce privilege levels, aka "Hypervisor Code Integrity Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5218
Title:
HTTP.sys Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5218
CVE-2018-8226
Severity:
High
Description:
A denial of service vulnerability exists in the HTTP 2.0 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP 2.0 requests, aka "HTTP.sys Denial of Service Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5216
Title:
HTTP Protocol Stack Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5216
CVE-2018-8231
Severity:
High
Description:
A remote code execution vulnerability exists when HTTP Protocol Stack (Http.sys) improperly handles objects in memory, aka "HTTP Protocol Stack Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5221
Title:
HIDParser Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5221
CVE-2018-8169
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the (Human Interface Device) HID Parser Library driver improperly handles objects in memory, aka "HIDParser Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-08-03
Updated:
2024-01-17

ID:
CISEC:5183
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5183
CVE-2018-8121
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 10 Servers, Windows 10. This CVE ID is unique from CVE-2018-8207.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5194
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5194
CVE-2018-8224
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5184
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5184
CVE-2018-0982
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5185
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5185
CVE-2018-8207
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8121.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5187
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5187
CVE-2018-8243
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-8267.
Applies to:
Microsoft Edge
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5188
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5188
CVE-2018-8267
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8243.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5198
Title:
NTFS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5198
CVE-2018-1036
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when NTFS improperly checks access, aka "NTFS Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5173
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5173
CVE-2018-8235
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins, aka "Microsoft Edge Security Feature Bypass Vulnerability." This affects Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5178
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5178
CVE-2018-8236
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8110, CVE-2018-8111.
Applies to:
Microsoft Edge
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5180
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5180
CVE-2018-8111
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8110, CVE-2018-8236.
Applies to:
Microsoft Edge
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5174
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5174
CVE-2018-8110
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8111, CVE-2018-8236.
Applies to:
Microsoft Edge
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5181
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5181
CVE-2018-8234
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-0871.
Applies to:
Microsoft Edge
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5176
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5176
CVE-2018-0871
Severity:
Medium
Description:
An information disclosure vulnerability exists when Edge improperly marks files, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8234.
Applies to:
Microsoft Edge
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5177
Title:
Internet Explorer Security Feature Bypass Vulnerability
Type:
Web
Bulletins:
CISEC:5177
CVE-2018-8113
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Internet Explorer that allows for bypassing Mark of the Web Tagging (MOTW), aka "Internet Explorer Security Feature Bypass Vulnerability." This affects Internet Explorer 11.
Applies to:
Internet Explorer
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5179
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Web
Bulletins:
CISEC:5179
CVE-2018-0978
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-8249.
Applies to:
Internet Explorer
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5175
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Web
Bulletins:
CISEC:5175
CVE-2018-8249
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 11. This CVE ID is unique from CVE-2018-0978.
Applies to:
Internet Explorer
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5190
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5190
CVE-2018-8201
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8211, CVE-2018-8212, CVE-2018-8215, CVE-2018-8216, CVE-2018-8217, CVE-2018-8221.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5191
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5191
CVE-2018-8217
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10. This CVE ID is unique from CVE-2018-8201, CVE-2018-8211, CVE-2018-8212, CVE-2018-8215, CVE-2018-8216, CVE-2018-8221.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5192
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5192
CVE-2018-8212
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8201, CVE-2018-8211, CVE-2018-8215, CVE-2018-8216, CVE-2018-8217, CVE-2018-8221.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5193
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5193
CVE-2018-8211
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows 10 Servers, Windows 10. This CVE ID is unique from CVE-2018-8201, CVE-2018-8212, CVE-2018-8215, CVE-2018-8216, CVE-2018-8217, CVE-2018-8221.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5195
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5195
CVE-2018-8221
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8201, CVE-2018-8211, CVE-2018-8212, CVE-2018-8215, CVE-2018-8216, CVE-2018-8217.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5196
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5196
CVE-2018-8215
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8201, CVE-2018-8211, CVE-2018-8212, CVE-2018-8216, CVE-2018-8217, CVE-2018-8221.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5197
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5197
CVE-2018-8216
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session, aka "Device Guard Code Integrity Policy Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10. This CVE ID is unique from CVE-2018-8201, CVE-2018-8211, CVE-2018-8212, CVE-2018-8215, CVE-2018-8217, CVE-2018-8221.
Applies to:
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5186
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5186
CVE-2018-8229
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8227.
Applies to:
Microsoft Edge
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5189
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5189
CVE-2018-8227
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8229.
Applies to:
Microsoft Edge
Created:
2018-07-27
Updated:
2024-01-17

ID:
CISEC:5133
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5133
CVE-2018-8157
Severity:
High
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint Server, Microsoft SharePoint. This CVE ID is unique from CVE-2018-8155, CVE-2018-8156, CVE-2018-8168.
Applies to:
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-07-20
Updated:
2024-01-17

ID:
CISEC:5132
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5132
CVE-2018-8158
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Office. This CVE ID is unique from CVE-2018-8157, CVE-2018-8161.
Applies to:
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-07-20
Updated:
2024-01-17

ID:
CISEC:5138
Title:
Git OS Command Injection Vulnerability
Type:
Software
Bulletins:
CISEC:5138
CVE-2017-8386
Severity:
Medium
Description:
git-shell in git before 2.4.12, 2.5.x before 2.5.6, 2.6.x before 2.6.7, 2.7.x before 2.7.5, 2.8.x before 2.8.5, 2.9.x before 2.9.4, 2.10.x before 2.10.3, 2.11.x before 2.11.2, and 2.12.x before 2.12.3 might allow remote authenticated users to gain privileges via a repository name that starts with a - (dash) character.
Applies to:
Created:
2018-07-20
Updated:
2024-01-17

ID:
CISEC:5141
Title:
Git OS Command Injection Vulnerability
Type:
Software
Bulletins:
CISEC:5141
CVE-2017-14867
Severity:
High
Description:
Git before 2.10.5, 2.11.x before 2.11.4, 2.12.x before 2.12.5, 2.13.x before 2.13.6, and 2.14.x before 2.14.2 uses unsafe Perl scripts to support subcommands such as cvsserver, which allows attackers to execute arbitrary OS commands via shell metacharacters in a module name. The vulnerable code is reachable via git-shell even without CVS support.
Applies to:
Created:
2018-07-20
Updated:
2024-01-17

ID:
CISEC:5139
Title:
Git Input Validation Error Vulnerability
Type:
Software
Bulletins:
CISEC:5139
CVE-2018-1000021
Severity:
Medium
Description:
GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).
Applies to:
Created:
2018-07-20
Updated:
2024-01-17

ID:
CISEC:5140
Title:
Git Input Validation Error Vulnerability
Type:
Software
Bulletins:
CISEC:5140
CVE-2017-1000117
Severity:
Medium
Description:
A malicious third-party can give a crafted "ssh://..." URL to an unsuspecting victim, and an attempt to visit the URL can result in any program that exists on the victim's machine being executed. Such a URL could be placed in the .gitmodules file of a malicious project, and an unsuspecting victim could be tricked into running "git clone --recurse-submodules" to trigger the vulnerability.
Applies to:
Created:
2018-07-20
Updated:
2024-01-17

ID:
CISEC:5128
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5128
CVE-2018-8149
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint Server, Microsoft SharePoint. This CVE ID is unique from CVE-2018-8155, CVE-2018-8156, CVE-2018-8168.
Applies to:
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-07-13
Updated:
2024-01-17

ID:
CISEC:5129
Title:
Microsoft SharePoint Elevation of Privilege Vulnerabilit
Type:
Software
Bulletins:
CISEC:5129
CVE-2018-8156
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint, Microsoft Project Server. This CVE ID is unique from CVE-2018-8149, CVE-2018-8155, CVE-2018-8168.
Applies to:
Microsoft Project Server 2010
Microsoft Project Server 2013
Microsoft SharePoint Server 2016
Created:
2018-07-13
Updated:
2024-01-17

ID:
CISEC:5130
Title:
Microsoft SharePoint Elevation of Privilege Vulnerabilit
Type:
Software
Bulletins:
CISEC:5130
CVE-2018-8168
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint Server, Microsoft SharePoint. This CVE ID is unique from CVE-2018-8149, CVE-2018-8155, CVE-2018-8156.
Applies to:
Microsoft Project Server 2010
Microsoft Project Server 2013
Microsoft SharePoint Server 2016
Created:
2018-07-13
Updated:
2024-01-17

ID:
CISEC:5131
Title:
Microsoft SharePoint Elevation of Privilege Vulnerabilit
Type:
Software
Bulletins:
CISEC:5131
CVE-2018-8155
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-8149, CVE-2018-8156, CVE-2018-8168.
Applies to:
Microsoft Project Server 2010
Microsoft Project Server 2013
Microsoft SharePoint Server 2016
Created:
2018-07-13
Updated:
2024-01-17

ID:
CISEC:5110
Title:
.NET and .NET Core Denial Of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5110
CVE-2018-0765
Severity:
Medium
Description:
A denial of service vulnerability exists when .NET and .NET Core improperly process XML documents, aka ".NET and .NET Core Denial of Service Vulnerability." This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, .NET Core 2.0, Microsoft .NET Framework 4.7.2.
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.7
Created:
2018-07-13
Updated:
2024-01-17

ID:
CISEC:5102
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5102
CVE-2018-0955
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5103
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5103
CVE-2018-0951
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Edge
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5104
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5104
CVE-2018-0953
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Edge
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5105
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5105
CVE-2018-8139
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137.
Applies to:
Microsoft Edge
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5106
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5106
CVE-2018-8114
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 11. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Internet Explorer 11
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5107
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5107
CVE-2018-8137
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8139.
Applies to:
Microsoft Edge
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5108
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5108
CVE-2018-8122
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 11. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Internet Explorer 11
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5109
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5109
CVE-2018-0946
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0945, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Edge
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5124
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5124
CVE-2018-8148
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-8147, CVE-2018-8162.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5125
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5125
CVE-2018-8147
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-8148, CVE-2018-8162.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5127
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5127
CVE-2018-8162
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-8147, CVE-2018-8148.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2016
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5126
Title:
Microsoft Excel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5126
CVE-2018-8163
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka "Microsoft Excel Information Disclosure Vulnerability." This affects Microsoft Office, Microsoft Excel.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2016
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5114
Title:
Git Arbitrary Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5114
CVE-2018-11235
Severity:
Medium
Description:
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
Applies to:
Git
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5112
Title:
.NET and .NET Core Denial Of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5112
CVE-2018-1039
Severity:
Medium
Description:
A security feature bypass vulnerability exists in .Net Framework which could allow an attacker to bypass Device Guard, aka ".NET Framework Device Guard Security Feature Bypass Vulnerability." This affects Microsoft .NET Framework 4.7.1, Microsoft .NET Framework 4.6, Microsoft .NET Framework 3.5, Microsoft .NET Framework 4.7/4.7.1, Microsoft .NET Framework 3.0, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6.2/4.7/4.7.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1, Microsoft .NET Framework 2.0, Microsoft .NET Framework 4.6/4.6.1/4.6.2.
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Microsoft .NET Framework 4.6
Microsoft .NET Framework 4.7
Created:
2018-07-06
Updated:
2024-01-17

ID:
CISEC:5057
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5057
CVE-2018-8897
Severity:
High
Description:
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP SS, as demonstrated by (for example) privilege escalation in Windows, macOS, some Xen configurations, or FreeBSD, or a Linux kernel crash. The MOV to SS and POP SS instructions inhibit interrupts (including NMIs), data breakpoints, and single step trap exceptions until the instruction boundary following the next instruction (SDM Vol. 3A; section 6.8.3). (The inhibited data breakpoints are those on memory accessed by the MOV to SS or POP to SS instruction itself.) Note that debug exceptions are not inhibited by the interrupt enable (EFLAGS.IF) system flag (SDM Vol. 3A; section 2.3). If the instruction following the MOV to SS or POP to SS instruction is an instruction like SYSCALL, SYSENTER, INT 3, etc. that transfers control to the operating system at CPL < 3, the debug exception is delivered after the transfer to CPL < 3 is complete. OS kernels may not expect this order of events and may therefore experience unexpected behavior when it occurs.
Applies to:
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5097
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5097
CVE-2018-0945
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5098
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5098
CVE-2018-0954
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5099
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5099
CVE-2018-1022
Severity:
High
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka "Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-8114, CVE-2018-8122, CVE-2018-8128, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5101
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5101
CVE-2018-8128
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0945, CVE-2018-0946, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-0955, CVE-2018-1022, CVE-2018-8114, CVE-2018-8122, CVE-2018-8137, CVE-2018-8139.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5055
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5055
CVE-2018-8112
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Microsoft Edge improperly handles requests of different origins, aka "Microsoft Edge Security Feature Bypass Vulnerability." This affects Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5054
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5054
CVE-2018-8179
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability." This affects Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5053
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5053
CVE-2018-8123
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-1021.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5094
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5094
CVE-2018-1021
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-8123.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5095
Title:
Microsoft Browser Memory Corruption Vulnerability
Type:
Web
Bulletins:
CISEC:5095
CVE-2018-8178
Severity:
High
Description:
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge.
Applies to:
Internet Explorer
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5093
Title:
Microsoft Browser Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5093
CVE-2018-1025
Severity:
Medium
Description:
An information disclosure vulnerability exists when affected Microsoft browsers improperly handle objects in memory, aka "Microsoft Browser Information Disclosure Vulnerability." This affects Internet Explorer 11, Microsoft Edge.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5096
Title:
Internet Explorer Security Feature Bypass Vulnerability
Type:
Web
Bulletins:
CISEC:5096
CVE-2018-8126
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Internet Explorer fails to validate User Mode Code Integrity (UMCI) policies, aka "Internet Explorer Security Feature Bypass Vulnerability." This affects Internet Explorer 11.
Applies to:
Internet Explorer
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5050
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5050
CVE-2018-8130
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0943, CVE-2018-8133, CVE-2018-8145, CVE-2018-8177.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5051
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5051
CVE-2018-0943
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8130, CVE-2018-8133, CVE-2018-8145, CVE-2018-8177.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5052
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5052
CVE-2018-8133
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0943, CVE-2018-8130, CVE-2018-8145, CVE-2018-8177.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5056
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5056
CVE-2018-8177
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore. This CVE ID is unique from CVE-2018-0943, CVE-2018-8130, CVE-2018-8133, CVE-2018-8145.
Applies to:
Microsoft Edge
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5100
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:5100
CVE-2018-8145
Severity:
High
Description:
An information disclosure vulnerability exists when Chakra improperly discloses the contents of its memory, which could provide an attacker with information to further compromise the user's computer or data, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects ChakraCore, Internet Explorer 11, Microsoft Edge, Internet Explorer 10. This CVE ID is unique from CVE-2018-0943, CVE-2018-8130, CVE-2018-8133, CVE-2018-8177.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2018-06-29
Updated:
2024-01-17

ID:
CISEC:5024
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5024
CVE-2018-0958
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0854, CVE-2018-8129, CVE-2018-8132.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5025
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5025
CVE-2018-8129
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0854, CVE-2018-0958, CVE-2018-8132.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5026
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5026
CVE-2018-8132
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0854, CVE-2018-0958, CVE-2018-8129.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5027
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5027
CVE-2018-0854
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows Scripting Host which could allow an attacker to bypass Device Guard, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0958, CVE-2018-8129, CVE-2018-8132.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5033
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5033
CVE-2018-8142
Severity:
Medium
Description:
A security feature bypass exists when Windows incorrectly validates kernel driver signatures, aka "Windows Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1035.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5035
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5035
CVE-2018-1035
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard, aka "Windows Security Feature Bypass Vulnerability." This affects Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5034
Title:
Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5034
CVE-2018-8136
Severity:
High
Description:
A remote code execution vulnerability exists in the way that Windows handles objects in memory, aka "Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5048
Title:
Windows Image Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5048
CVE-2018-8170
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory, aka "Windows Image Elevation of Privilege Vulnerability." This affects Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5032
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5032
CVE-2018-8134
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5049
Title:
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5049
CVE-2018-8167
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory, aka "Windows Common Log File System Driver Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5030
Title:
Microsoft COM for Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5030
CVE-2018-0824
Severity:
Medium
Description:
A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5029
Title:
Hyper-V vSMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5029
CVE-2018-0961
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate vSMB packet data, aka "Hyper-V vSMB Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5028
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5028
CVE-2018-0959
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5036
Title:
DirectX Graphics Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5036
CVE-2018-8165
Severity:
High
Description:
An elevation of privilege vulnerability exists when the DirectX Graphics Kernel (DXGKRNL) driver improperly handles objects in memory, aka "DirectX Graphics Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-22
Updated:
2024-01-17

ID:
CISEC:5020
Title:
Windows VBScript Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5020
CVE-2018-8174
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-15
Updated:
2024-01-17

ID:
CISEC:5022
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5022
CVE-2018-8141
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8127.
Applies to:
Created:
2018-06-15
Updated:
2024-01-17

ID:
CISEC:5023
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5023
CVE-2018-8127
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8141.
Applies to:
Created:
2018-06-15
Updated:
2024-01-17

ID:
CISEC:4997
Title:
Windows VBScript Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4997
CVE-2018-1004
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Internet Explorer 9, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10.
Applies to:
Microsoft Internet Explorer 9
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:5015
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5015
CVE-2018-8166
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8120, CVE-2018-8124, CVE-2018-8164.
Applies to:
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:5017
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5017
CVE-2018-8164
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8120, CVE-2018-8124, CVE-2018-8166.
Applies to:
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:5018
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5018
CVE-2018-8120
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows Server 2008, Windows 7, Windows Server 2008 R2. This CVE ID is unique from CVE-2018-8124, CVE-2018-8164, CVE-2018-8166.
Applies to:
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:5019
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5019
CVE-2018-8124
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka "Win32k Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8120, CVE-2018-8164, CVE-2018-8166.
Applies to:
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:4994
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4994
CVE-2018-1030
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Office. This CVE ID is unique from CVE-2018-1026.
Applies to:
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:4995
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4995
CVE-2018-1026
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Office. This CVE ID is unique from CVE-2018-1030.
Applies to:
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:4992
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4992
CVE-2018-1007
Severity:
Low
Description:
An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory, aka "Microsoft Office Information Disclosure Vulnerability." This affects Microsoft Office. This CVE ID is unique from CVE-2018-0950.
Applies to:
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:4993
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4993
CVE-2018-0950
Severity:
Medium
Description:
An information disclosure vulnerability exists when Office renders Rich Text Format (RTF) email messages containing OLE objects when a message is opened or previewed, aka "Microsoft Office Information Disclosure Vulnerability." This affects Microsoft Word, Microsoft Office. This CVE ID is unique from CVE-2018-1007.
Applies to:
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:4998
Title:
Microsoft Malware Protection Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4998
CVE-2018-0986
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft Malware Protection Engine does not properly scan a specially crafted file, leading to memory corruption, aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability." This affects Windows Defender, Windows Intune Endpoint Protection, Microsoft Security Essentials, Microsoft System Center Endpoint Protection, Microsoft Exchange Server, Microsoft System Center, Microsoft Forefront Endpoint Protection.
Applies to:
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:4996
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4996
CVE-2018-1029
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel Viewer, Microsoft Office, Microsoft Excel. This CVE ID is unique from CVE-2018-0920, CVE-2018-1011, CVE-2018-1027.
Applies to:
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-06-08
Updated:
2024-01-17

ID:
CISEC:4978
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4978
CVE-2018-1001
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0988, CVE-2018-0996.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4980
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4980
CVE-2018-0996
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0988, CVE-2018-1001.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4982
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4982
CVE-2018-0988
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0996, CVE-2018-1001.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4983
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4983
CVE-2018-1000
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Information Disclosure Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0981, CVE-2018-0987, CVE-2018-0989.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4977
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4977
CVE-2018-0981
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Information Disclosure Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0987, CVE-2018-0989, CVE-2018-1000.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4979
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4979
CVE-2018-0989
Severity:
Medium
Description:
An information disclosure vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka "Scripting Engine Information Disclosure Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0981, CVE-2018-0987, CVE-2018-1000.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4981
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4981
CVE-2018-0987
Severity:
Medium
Description:
An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Internet Explorer, aka "Scripting Engine Information Disclosure Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0981, CVE-2018-0989, CVE-2018-1000.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4984
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4984
CVE-2018-1034
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-1005, CVE-2018-1014, CVE-2018-1032.
Applies to:
Microsoft SharePoint Server 2016
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4985
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4985
CVE-2018-1032
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint Server, Microsoft SharePoint. This CVE ID is unique from CVE-2018-1005, CVE-2018-1014, CVE-2018-1034.
Applies to:
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4986
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4986
CVE-2018-1014
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-1005, CVE-2018-1032, CVE-2018-1034.
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4987
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4987
CVE-2018-1005
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka "Microsoft SharePoint Elevation of Privilege Vulnerability." This affects Microsoft SharePoint. This CVE ID is unique from CVE-2018-1014, CVE-2018-1032, CVE-2018-1034.
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4973
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4973
CVE-2018-1027
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel, Microsoft Office. This CVE ID is unique from CVE-2018-0920, CVE-2018-1011, CVE-2018-1029.
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Office Compatibility Pack
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4974
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4974
CVE-2018-1011
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel. This CVE ID is unique from CVE-2018-0920, CVE-2018-1027, CVE-2018-1029.
Applies to:
Microsoft Excel 2010
Microsoft Excel 2013
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4975
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4975
CVE-2018-0920
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Excel. This CVE ID is unique from CVE-2018-1011, CVE-2018-1027, CVE-2018-1029.
Applies to:
Microsoft Excel 2010
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4964
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4964
CVE-2018-0998
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Edge PDF Reader improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-0892.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4965
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4965
CVE-2018-0892
Severity:
Medium
Description:
An information disclosure vulnerability exists when Microsoft Edge improperly handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability." This affects Microsoft Edge. This CVE ID is unique from CVE-2018-0998.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4926
Title:
Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4926
CVE-2018-1009
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows improperly handles objects in memory and incorrectly maps kernel memory, aka "Microsoft DirectX Graphics Kernel Subsystem Elevation of Privilege Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4976
Title:
Microsoft Browser Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4976
CVE-2018-1023
Severity:
High
Description:
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka "Microsoft Browser Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4988
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4988
CVE-2018-8118
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 11, Internet Explorer 10.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4929
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4929
CVE-2018-0997
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 11. This CVE ID is unique from CVE-2018-0870, CVE-2018-0991, CVE-2018-1018, CVE-2018-1020.
Applies to:
Microsoft Internet Explorer 11
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4930
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4930
CVE-2018-1020
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 9, Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0870, CVE-2018-0991, CVE-2018-0997, CVE-2018-1018.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4931
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4931
CVE-2018-1018
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 11. This CVE ID is unique from CVE-2018-0870, CVE-2018-0991, CVE-2018-0997, CVE-2018-1020.
Applies to:
Microsoft Internet Explorer 11
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4927
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4927
CVE-2018-0870
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 11. This CVE ID is unique from CVE-2018-0991, CVE-2018-0997, CVE-2018-1018, CVE-2018-1020.
Applies to:
Microsoft Internet Explorer 11
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4928
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4928
CVE-2018-0991
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka "Internet Explorer Memory Corruption Vulnerability." This affects Internet Explorer 11, Internet Explorer 10. This CVE ID is unique from CVE-2018-0870, CVE-2018-0997, CVE-2018-1018, CVE-2018-1020.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4966
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4966
CVE-2018-0980
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0990, CVE-2018-0993, CVE-2018-0994, CVE-2018-0995, CVE-2018-1019.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4967
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4967
CVE-2018-0993
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0994, CVE-2018-0995, CVE-2018-1019.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4968
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4968
CVE-2018-0994
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0993, CVE-2018-0995, CVE-2018-1019.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4969
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4969
CVE-2018-0995
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0993, CVE-2018-0994, CVE-2018-1019.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4970
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4970
CVE-2018-0979
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0980, CVE-2018-0990, CVE-2018-0993, CVE-2018-0994, CVE-2018-0995, CVE-2018-1019.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4971
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4971
CVE-2018-1019
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0990, CVE-2018-0993, CVE-2018-0994, CVE-2018-0995.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4972
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4972
CVE-2018-0990
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka "Chakra Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0979, CVE-2018-0980, CVE-2018-0993, CVE-2018-0994, CVE-2018-0995, CVE-2018-1019.
Applies to:
Microsoft Edge
Created:
2018-06-01
Updated:
2024-01-17

ID:
CISEC:4909
Title:
Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:4909
CVE-2018-0976
Severity:
Low
Description:
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka "Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-05-25
Updated:
2024-01-17

ID:
CISEC:4910
Title:
Microsoft JET Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4910
CVE-2018-1003
Severity:
High
Description:
A buffer overflow vulnerability exists in the Microsoft JET Database Engine that could allow remote code execution on an affected system, aka "Microsoft JET Database Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10.
Applies to:
Created:
2018-05-25
Updated:
2024-01-17

ID:
CISEC:4924
Title:
Microsoft JET Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4924
CVE-2018-1008
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory, aka "OpenType Font Driver Elevation of Privilege Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-05-25
Updated:
2024-01-17

ID:
CISEC:4905
Title:
Microsoft Graphics Component Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:4905
CVE-2018-8116
Severity:
Low
Description:
A denial of service vulnerability exists in the way that Windows handles objects in memory, aka "Microsoft Graphics Component Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-05-25
Updated:
2024-01-17

ID:
CISEC:4906
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4906
CVE-2018-0957
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0964.
Applies to:
Created:
2018-05-25
Updated:
2024-01-17

ID:
CISEC:4907
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4907
CVE-2018-0964
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system, aka "Hyper-V Information Disclosure Vulnerability." This affects Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0957.
Applies to:
Created:
2018-05-25
Updated:
2024-01-17

ID:
CISEC:4908
Title:
Active Directory Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:4908
CVE-2018-0890
Severity:
Low
Description:
A security feature bypass vulnerability exists when Active Directory incorrectly applies Network Isolation settings, aka "Active Directory Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-05-25
Updated:
2024-01-17

ID:
CISEC:4899
Title:
Windows SNMP Service Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:4899
CVE-2018-0967
Severity:
Medium
Description:
A denial of service vulnerability exists in the way that Windows SNMP Service handles malformed SNMP traps, aka "Windows SNMP Service Denial of Service Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4859
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4859
CVE-2018-0974
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0975.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4860
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4860
CVE-2018-0971
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4861
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4861
CVE-2018-0975
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4862
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4862
CVE-2018-0969
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4863
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4863
CVE-2018-0960
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4864
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4864
CVE-2018-0973
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0974, CVE-2018-0975.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4865
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4865
CVE-2018-0970
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4867
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4867
CVE-2018-0887
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4868
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4868
CVE-2018-0972
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0968, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4869
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4869
CVE-2018-0968
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass, aka "Windows Kernel Information Disclosure Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-0887, CVE-2018-0960, CVE-2018-0969, CVE-2018-0970, CVE-2018-0971, CVE-2018-0972, CVE-2018-0973, CVE-2018-0974, CVE-2018-0975.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4866
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4866
CVE-2018-0963
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4870
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4870
CVE-2018-1038
Severity:
High
Description:
The Windows kernel in Windows 7 SP1 and Windows Server 2008 R2 SP1 allows an elevation of privilege vulnerability due to the way it handles objects in memory, aka "Windows Kernel Elevation of Privilege Vulnerability."
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4900
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4900
CVE-2018-1010
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1012, CVE-2018-1013, CVE-2018-1015, CVE-2018-1016.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4901
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4901
CVE-2018-1012
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1010, CVE-2018-1013, CVE-2018-1015, CVE-2018-1016.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4902
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4902
CVE-2018-1016
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1010, CVE-2018-1012, CVE-2018-1013, CVE-2018-1015.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4903
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4903
CVE-2018-1015
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1010, CVE-2018-1012, CVE-2018-1013, CVE-2018-1016.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4904
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4904
CVE-2018-1013
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka "Microsoft Graphics Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-1010, CVE-2018-1012, CVE-2018-1015, CVE-2018-1016.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4898
Title:
HTTP.sys Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:4898
CVE-2018-0956
Severity:
High
Description:
A denial of service vulnerability exists in the HTTP 2.0 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP 2.0 requests, aka "HTTP.sys Denial of Service Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4897
Title:
Device Guard Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:4897
CVE-2018-0966
Severity:
Low
Description:
A security feature bypass exists when Device Guard incorrectly validates an untrusted file, aka "Device Guard Security Feature Bypass Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Applies to:
Created:
2018-05-18
Updated:
2024-01-17

ID:
CISEC:4858
Title:
XSS in interstitials
Type:
Web
Bulletins:
CISEC:4858
CVE-2018-6081
Severity:
Medium
Description:
XSS in interstitials.
Applies to:
Google Chrome
Created:
2018-05-11
Updated:
2024-01-17

ID:
CISEC:4853
Title:
Use after free in Flash
Type:
Web
Bulletins:
CISEC:4853
CVE-2017-11215
Severity:
High
Description:
Use after free in Flash.
Applies to:
Google Chrome
Created:
2018-05-11
Updated:
2024-01-17

ID:
CISEC:4852
Title:
Use after free in Flash
Type:
Web
Bulletins:
CISEC:4852
CVE-2017-11225
Severity:
High
Description:
Use after free in Flash.
Applies to:
Google Chrome
Created:
2018-05-11
Updated:
2024-01-17

ID:
CISEC:4854
Title:
URL Spoof in OmniBox
Type:
Web
Bulletins:
CISEC:4854
CVE-2018-6078
Severity:
Medium
Description:
URL Spoof in OmniBox.
Applies to:
Google Chrome
Created:
2018-05-11
Updated:
2024-01-17

ID:
CISEC:4855
Title:
Timing attack using SVG filters
Type:
Web
Bulletins:
CISEC:4855
CVE-2018-6077
Severity:
Medium
Description:
Timing attack using SVG filters.
Applies to:
Google Chrome
Created:
2018-05-11
Updated:
2024-01-17

ID:
CISEC:4856
Title:
Information disclosure via texture data in WebGL
Type:
Web
Bulletins:
CISEC:4856
CVE-2018-6079
Severity:
Medium
Description:
Information disclosure via texture data in WebGL.
Applies to:
Google Chrome
Created:
2018-05-11
Updated:
2024-01-17

ID:
CISEC:4857
Title:
Information disclosure in IPC call
Type:
Web
Bulletins:
CISEC:4857
CVE-2018-6080
Severity:
Medium
Description:
Information disclosure in IPC call.
Applies to:
Google Chrome
Created:
2018-05-11
Updated:
2024-01-17

ID:
CISEC:4850
Title:
Incorrect processing of AppManifests
Type:
Web
Bulletins:
CISEC:4850
CVE-2018-6083
Severity:
Medium
Description:
Incorrect processing of AppManifests.
Applies to:
Google Chrome
Created:
2018-05-11
Updated:
2024-01-17

ID:
CISEC:4851
Title:
Circumvention of port blocking
Type:
Web
Bulletins:
CISEC:4851
CVE-2018-6082
Severity:
Medium
Description:
Circumvention of port blocking.
Applies to:
Google Chrome
Created:
2018-05-11
Updated:
2024-01-17

ID:
CISEC:4751
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4751
CVE-2018-0922
Severity:
High
Description:
Microsoft Office 2010 SP2, 2013 SP1, and 2016, Microsoft Office 2016 Click-to-Run Microsoft Office 2016 for Mac, Microsoft Office Compatibility Pack SP2, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps 2013 SP1, Microsoft Office Word Viewer, Microsoft SharePoint Enterprise Server 2013 SP1, Microsoft SharePoint Enterprise Server 2016, Microsoft Office Compatibility Pack SP2, Microsoft Online Server 2016, Microsoft SharePoint Server 2010 SP2, Microsoft Word 2007 SP3, Microsoft Word 2010 SP2, Word 2013 and Microsoft Word 2016 allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability".
Applies to:
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft Office Web Apps Server 2013
Microsoft Office Word Viewer
Microsoft SharePoint Server 2010
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Created:
2018-05-04
Updated:
2024-01-17

ID:
CISEC:4753
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4753
CVE-2018-0919
Severity:
Medium
Description:
Microsoft Office 2010 SP2, 2013 SP1, and 2016, Microsoft Office 2016 Click-to-Run Microsoft Office 2016 for Mac, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps 2013 SP1, Microsoft SharePoint Enterprise Server 2013 SP1, Microsoft SharePoint Enterprise Server 2016, Microsoft SharePoint Server 2010 SP2, Microsoft Word 2010 SP2, Word 2013 SP1 and Microsoft Word 2016 allow an information disclosure vulnerability due to how variables are initialized, aka "Microsoft Office Information Disclosure Vulnerability".
Applies to:
Microsoft Office 2010
Microsoft Office Web Apps 2010
Microsoft Office Web Apps Server 2013
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-05-04
Updated:
2024-01-17

ID:
CISEC:4755
Title:
Microsoft Office Excel Security Feature Bypass
Type:
Software
Bulletins:
CISEC:4755
CVE-2018-0907
Severity:
Medium
Description:
Microsoft Excel 2007 SP3, Microsoft Excel 2010 SP2, Microsoft Excel 2013 SP1, Microsoft Excel 2016, Microsoft Office 2016 Click-to-Run and Microsoft Office 2016 for Mac allow a security feature bypass vulnerability due to how macro settings are enforced, aka "Microsoft Office Excel Security Feature Bypass".
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2016
Created:
2018-05-04
Updated:
2024-01-17

ID:
CISEC:4749
Title:
Microsoft Exchange Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4749
CVE-2018-0924
Severity:
Medium
Description:
Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchange Server 2016 Cumulative Update 7, and Microsoft Exchange Server 2016 Cumulative Update 8 allow an information disclosure vulnerability due to how URL redirects are handled, aka "Microsoft Exchange Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0941.
Applies to:
Microsoft Exchange Server 2010
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Created:
2018-05-04
Updated:
2024-01-17

ID:
CISEC:4756
Title:
Microsoft Exchange Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4756
CVE-2018-0940
Severity:
Medium
Description:
Microsoft Exchange Outlook Web Access (OWA) in Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 20, Microsoft Exchange Server 2013 Cumulative Update 18, Microsoft Exchange Server 2013 Cumulative Update 19, Microsoft Exchange Server 2013 Service Pack 1, Microsoft Exchange Server 2016 Cumulative Update 7, and Microsoft Exchange Server 2016 Cumulative Update 8 allows an elevation of privilege vulnerability due to how links in the body of an email message are rewritten, aka "Microsoft Exchange Elevation of Privilege Vulnerability".
Applies to:
Microsoft Exchange Server 2010
Microsoft Exchange Server 2013
Microsoft Exchange Server 2016
Created:
2018-05-04
Updated:
2024-01-17

ID:
CISEC:4757
Title:
Microsoft Exchange Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4757
CVE-2018-0941
Severity:
Medium
Description:
Microsoft Exchange Server 2016 Cumulative Update 7 and Microsoft Exchange Server 2016 Cumulative Update 8 allow an information disclosure vulnerability due to how data is imported, aka "Microsoft Exchange Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0924.
Applies to:
Microsoft Exchange Server 2016
Created:
2018-05-04
Updated:
2024-01-17

ID:
CISEC:4752
Title:
Microsoft Access Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4752
CVE-2018-0903
Severity:
Medium
Description:
Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Access Remote Code Execution Vulnerability".
Applies to:
Microsoft Access 2010
Microsoft Access 2013
Microsoft Access 2016
Microsoft Office 2016
Created:
2018-05-04
Updated:
2024-01-17

ID:
CVE-2013-6272
Title:
The NotificationBroadcastReceiver class in the com.android.phone process in Google Android 4.1.1 through 4.4.2 allows attackers to bypass intended access restrictions and consequently make phone calls to arbitrary numbers, send mmi...
Type:
Mobile Devices
Bulletins:
CVE-2013-6272
SFBID68415
Severity:
Medium
Description:
The NotificationBroadcastReceiver class in the com.android.phone process in Google Android 4.1.1 through 4.4.2 allows attackers to bypass intended access restrictions and consequently make phone calls to arbitrary numbers, send mmi or ussd codes, or hangup ongoing calls via a crafted application.
Applies to:
Created:
2018-05-02
Updated:
2024-01-17

ID:
CISEC:4727
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4727
CVE-2018-0926
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, and CVE-2018-0901.
Applies to:
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4729
Title:
Use after free in Blink
Type:
Web
Bulletins:
CISEC:4729
CVE-2018-6060
Severity:
Medium
Description:
Use after free in Blink.
Applies to:
Google Chrome
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4731
Title:
Type confusion in V8
Type:
Web
Bulletins:
CISEC:4731
CVE-2018-6064
Severity:
Medium
Description:
Type confusion in V8.
Applies to:
Google Chrome
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4732
Title:
Same Origin Bypass via canvas
Type:
Web
Bulletins:
CISEC:4732
CVE-2018-6066
Severity:
Medium
Description:
Same Origin Bypass via canvas.
Applies to:
Google Chrome
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4737
Title:
Race condition in V8
Type:
Web
Bulletins:
CISEC:4737
CVE-2018-6061
Severity:
Medium
Description:
Race condition in V8.
Applies to:
Google Chrome
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4723
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4723
CVE-2018-0879
Severity:
Medium
Description:
Microsoft Edge in Windows 10 1709 allows information disclosure, due to how Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability".
Applies to:
Microsoft Edge
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4724
Title:
Microsoft Browser Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4724
CVE-2018-0927
Severity:
Medium
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows information disclosure, due to how Microsoft browsers handle objects in memory, aka "Microsoft Browser Information Disclosure Vulnerability".
Applies to:
Internet Explorer 11
Microsoft Edge
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4726
Title:
Microsoft Browser Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4726
CVE-2018-0932
Severity:
Medium
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Microsoft Edge and Internet Explorer in Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016 and Windows Server, version 1709 allows information disclosure, due to how Microsoft browsers handle objects in memory, aka "Microsoft Browser Information Disclosure Vulnerability".
Applies to:
Internet Explorer 11
Microsoft Edge
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4725
Title:
Internet Explorer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4725
CVE-2018-0929
Severity:
Medium
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow information disclosure, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Information Disclosure Vulnerability".
Applies to:
Internet Explorer 11
Microsoft Edge
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4722
Title:
Internet Explorer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4722
CVE-2018-0942
Severity:
Low
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow elevation of privilege, due to how Internet Explorer handles zone and integrity settings, aka "Internet Explorer Elevation of Privilege Vulnerability".
Applies to:
Internet Explorer 11
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4735
Title:
Integer overflow in V8
Type:
Web
Bulletins:
CISEC:4735
CVE-2018-6065
Severity:
Medium
Description:
Integer overflow in V8.
Applies to:
Google Chrome
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4730
Title:
Incorrect permissions on shared memory
Type:
Web
Bulletins:
CISEC:4730
CVE-2018-6063
Severity:
Medium
Description:
Incorrect permissions on shared memory.
Applies to:
Google Chrome
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4733
Title:
Incorrect permissions on shared memory
Type:
Web
Bulletins:
CISEC:4733
CVE-2018-6057
Severity:
Medium
Description:
Incorrect permissions on shared memory.
Applies to:
Google Chrome
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4736
Title:
Heap buffer overflow in Skia
Type:
Web
Bulletins:
CISEC:4736
CVE-2018-6062
Severity:
Medium
Description:
Heap buffer overflow in Skia.
Applies to:
Google Chrome
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4734
Title:
Buffer overflow in Skia
Type:
Web
Bulletins:
CISEC:4734
CVE-2018-6067
Severity:
Medium
Description:
Buffer overflow in Skia.
Applies to:
Google Chrome
Created:
2018-04-27
Updated:
2024-01-17

ID:
CISEC:4707
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:4707
CVE-2018-0884
Severity:
Medium
Description:
Windows Scripting Host (WSH) in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a security feature bypass vulnerability due to how objects are handled in memory, aka "Windows Security Feature Bypass Vulnerability". This CVE is unique from CVE-2018-0902.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4706
Title:
Windows Remote Assistance Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4706
CVE-2018-0878
Severity:
Low
Description:
Windows Remote Assistance in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how XML External Entities (XXE) are processed, aka "Windows Remote Assistance Information Disclosure Vulnerability".
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4639
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4639
CVE-2018-0897
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4641
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4641
CVE-2018-0894
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4642
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4642
CVE-2018-0898
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4643
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4643
CVE-2018-0896
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4644
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4644
CVE-2018-0904
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows information disclosure vulnerability due to how memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability".
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4645
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4645
CVE-2018-0813
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are initialized in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, and CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4647
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4647
CVE-2018-0900
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4648
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4648
CVE-2018-0899
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4649
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4649
CVE-2018-0895
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4650
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4650
CVE-2018-0811
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are initialized in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4651
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4651
CVE-2018-0901
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0814, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4653
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4653
CVE-2018-0814
Severity:
Low
Description:
The Windows kernel in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are initialized in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0811, CVE-2018-0813, CVE-2018-0894, CVE-2018-0895, CVE-2018-0896, CVE-2018-0897, CVE-2018-0898, CVE-2018-0899, CVE-2018-0900, and CVE-2018-0901 and CVE-2018-0926.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4654
Title:
Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4654
CVE-2018-0868
Severity:
Medium
Description:
Windows Installer in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how input is sanitized, aka "Windows Installer Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4640
Title:
Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4640
CVE-2018-0817
Severity:
Medium
Description:
The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows GDI Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0815 and CVE-2018-0816.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4646
Title:
Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4646
CVE-2018-0816
Severity:
Medium
Description:
The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows GDI Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0815 and CVE-2018-0817.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4652
Title:
Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4652
CVE-2018-0815
Severity:
Medium
Description:
The Windows Graphics Device Interface (GDI) in Microsoft Windows Server 2008 SP2 and R2 SP1 and Windows 7 SP1 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows GDI Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0816, and CVE-2018-0817.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4688
Title:
Windows Desktop Bridge VFS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4688
CVE-2018-0877
Severity:
High
Description:
The Desktop Bridge Virtual File System (VFS) in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how file paths are managed, aka "Windows Desktop Bridge VFS Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4687
Title:
Windows Desktop Bridge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4687
CVE-2018-0880
Severity:
Medium
Description:
The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0882.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4689
Title:
Windows Desktop Bridge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4689
CVE-2018-0882
Severity:
Medium
Description:
The Desktop Bridge in Windows 10 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how the virtual registry is managed, aka "Windows Desktop Bridge Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0880.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4678
Title:
Use-after-free write vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4678
CVE-2018-4902
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the rendering engine. The vulnerability is triggered by a crafted PDF file containing a video annotation (and corresponding media files) that is activated by the embedded JavaScript. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4662
Title:
Use-after-free vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4662
CVE-2018-4913
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the XFA engine, related to DOM manipulation. The vulnerability is triggered by crafted XFA script definitions in a PDF file. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4682
Title:
Use-after-free vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4682
CVE-2018-4911
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the JavaScript API related to bookmark functionality. The vulnerability is triggered by crafted JavaScript code embedded within a PDF file. A successful attack can lead to code corruption, control-flow hijack, or a code re-use attack.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4686
Title:
Use-after-free vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4686
CVE-2018-4888
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a use after free vulnerability. The vulnerability is triggered by a crafted PDF file that can cause a memory access violation exception in the XFA engine because of a dangling reference left as a consequence of freeing an object in the computation that manipulates internal nodes in a graph representation of a document object model used in XFA. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4670
Title:
Use-after-free vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4670
CVE-2018-4892
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the JBIG2 decoder. The vulnerability is triggered by a crafted PDF file that contains a malformed JBIG2 stream. Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CVE-2014-0900
Title:
The Device Administrator code in Android before 4.4.1_r1 might allow attackers to spoof device administrators and consequently bypass MDM restrictions by leveraging failure to update the mAdminMap data structure.
Type:
Mobile Devices
Bulletins:
CVE-2014-0900
Severity:
Medium
Description:
The Device Administrator code in Android before 4.4.1_r1 might allow attackers to spoof device administrators and consequently bypass MDM restrictions by leveraging failure to update the mAdminMap data structure.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4665
Title:
Security Mitigation Bypass vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4665
CVE-2018-4872
Severity:
High
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is a security bypass vulnerability that leads to a sandbox escape. Specifically, the vulnerability exists in the way a cross call is handled.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4720
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4720
CVE-2018-0889
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0876, CVE-2018-0893, CVE-2018-0925, and CVE-2018-0935.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4690
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4690
CVE-2018-0893
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0876, CVE-2018-0889, CVE-2018-0925, and CVE-2018-0935.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4694
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4694
CVE-2018-0925
Severity:
High
Description:
ChakraCore allows remote code execution, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0876, CVE-2018-0889, CVE-2018-0893, and CVE-2018-0935.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4699
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4699
CVE-2018-0876
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0889, CVE-2018-0893, CVE-2018-0925, and CVE-2018-0935.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4719
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4719
CVE-2018-0935
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0876, CVE-2018-0889, CVE-2018-0893, and CVE-2018-0925.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4721
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4721
CVE-2018-0891
Severity:
Medium
Description:
ChakraCore, and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow information disclosure, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0939.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4702
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4702
CVE-2018-0939
Severity:
Medium
Description:
ChakraCore and Microsoft Edge in Windows 10 1703 and 1709 allow information disclosure, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0891.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4660
Title:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4660
CVE-2018-4895
Severity:
High
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the image conversion engine when processing Enhanced Metafile Format Plus (EMF+) data. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4669
Title:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4669
CVE-2018-4898
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the XPS engine that adds vector graphics and images to a fixed page. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4676
Title:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4676
CVE-2018-4879
Severity:
High
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the image conversion module that processes Enhanced Metafile Format Plus (EMF+) data. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4677
Title:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4677
CVE-2018-4901
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the document identity representation. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4655
Title:
Microsoft Video Control Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4655
CVE-2018-0881
Severity:
Medium
Description:
The Microsoft Video Control in Microsoft Windows Server 2008 R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege due to how objects are handled in memory, aka "Microsoft Video Control Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4705
Title:
Microsoft Video Control Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4705
CVE-2018-0883
Severity:
High
Description:
Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how file copy destinations are validated, aka "Windows Shell Remote Code Execution Vulnerability".
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4661
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4661
CVE-2018-0923
Severity:
Medium
Description:
Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0912, CVE-2018-0913 CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Server 2013
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4663
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4663
CVE-2018-0915
Severity:
Medium
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0912, CVE-2018-0914, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4683
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4683
CVE-2018-0910
Severity:
Medium
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0911, CVE-2018-0912, CVE-2018-0913, CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4685
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4685
CVE-2018-0911
Severity:
Medium
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910, CVE-2018-0912, CVE-2018-0913, CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4664
Title:
Microsoft Sharepoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4664
CVE-2018-0947
Severity:
Medium
Description:
Microsoft SharePoint Foundation 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0912, CVE-2018-0913 CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923 and CVE-2018-0944.
Applies to:
Microsoft SharePoint Enterprise Server 2016
Microsoft SharePoint Foundation 2013
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4667
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4667
CVE-2018-0916
Severity:
Medium
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0912, CVE-2018-0913 CVE-2018-0914, CVE-2018-0915, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4668
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4668
CVE-2018-0917
Severity:
Medium
Description:
Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0912, CVE-2018-0913 CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4671
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4671
CVE-2018-0944
Severity:
Medium
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0912, CVE-2018-0913 CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923 and CVE-2018-0947.
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4672
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4672
CVE-2018-0914
Severity:
Medium
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0912, CVE-2018-0913, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4673
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4673
CVE-2018-0909
Severity:
Medium
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0910, CVE-2018-0911, CVE-2018-0912, CVE-2018-0913, CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4674
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4674
CVE-2018-0921
Severity:
Medium
Description:
Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0912, CVE-2018-0913 CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4675
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4675
CVE-2018-0912
Severity:
Medium
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0913, CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4680
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4680
CVE-2018-0913
Severity:
Medium
Description:
Microsoft Project Server 2013 SP1 and Microsoft SharePoint Enterprise Server 2016 allow an elevation of privilege vulnerability to due how specially crafted web requests are sanitized, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0909, CVE-2018-0910. CVE-2018-0911, CVE-2018-0913, CVE-2018-0914, CVE-2018-0915, CVE-2018-0916, CVE-2018-0917, CVE-2018-0921, CVE-2018-0923, CVE-2018-0944 and CVE-2018-0947.
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4703
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4703
CVE-2018-0885
Severity:
Medium
Description:
The Microsoft Hyper-V Network Switch in 64-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows a denial of service vulnerability due to how input from a privileged user on a guest operating system is validated, aka "Hyper-V Denial of Service Vulnerability".
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4704
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4704
CVE-2018-0888
Severity:
Medium
Description:
The Microsoft Hyper-V Network Switch in 64-bit versions of Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how guest operating system input is validated, aka "Hyper-V Information Disclosure Vulnerability".
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4684
Title:
Heap Overflow write vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4684
CVE-2018-4904
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a heap overflow vulnerability. The vulnerability is triggered by crafted TIFF data within an XPS file, which causes an out of bounds memory access. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4659
Title:
Heap Overflow vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4659
CVE-2018-4917
Severity:
High
Description:
Heap Overflow vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4681
Title:
Heap Overflow vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4681
CVE-2018-4910
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a heap overflow vulnerability in the JavaScript engine. The vulnerability is triggered by a PDF file with crafted JavaScript code that manipulates the optional content group (OCG). A successful attack can lead to code corruption, control-flow hijack, or a code re-use attack.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4679
Title:
Heap Overflow vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions
Type:
Software
Bulletins:
CISEC:4679
CVE-2018-4890
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability is an instance of a heap overflow vulnerability in the image conversion engine, when handling JPEG data embedded within an XPS file. A successful attack can lead to code corruption, control-flow hijack, or an information leak attack.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4709
Title:
CNG Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:4709
CVE-2018-0902
Severity:
Medium
Description:
The Cryptography Next Generation (CNG) kernel-mode driver (cng.sys) in Windows 10 Gold, 1511, 1607, 1703, and 1709. Windows Server 2016 and Windows Server, version 1709 allows a security feature bypass vulnerability due to the way the kernel-mode driver validates and enforces impersonation levels, aka "Windows Security Feature Bypass Vulnerability". This CVE is unique from CVE-2018-0884.
Applies to:
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4691
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4691
CVE-2018-0933
Severity:
High
Description:
ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4692
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4692
CVE-2018-0872
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4693
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4693
CVE-2018-0937
Severity:
High
Description:
ChakraCore and Microsoft Windows 10 1703 and 1709 allow remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, and CVE-2018-0936.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4695
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4695
CVE-2018-0936
Severity:
High
Description:
ChakraCore and Microsoft Windows 10 1709 allow remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, and CVE-2018-0937.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4696
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4696
CVE-2018-0874
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4697
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4697
CVE-2018-0930
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 1709 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4698
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4698
CVE-2018-0931
Severity:
High
Description:
ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4700
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4700
CVE-2018-0934
Severity:
High
Description:
ChakraCore and Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0873, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0936, and CVE-2018-0937.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4701
Title:
Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4701
CVE-2018-0873
Severity:
High
Description:
ChakraCore and Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the Chakra scripting engine handles objects in memory, aka "Chakra Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0872, CVE-2018-0874, CVE-2018-0930, CVE-2018-0931, CVE-2018-0933, CVE-2018-0934, CVE-2018-0936, and CVE-2018-0937.
Applies to:
Microsoft Edge
Created:
2018-04-20
Updated:
2024-01-17

ID:
CISEC:4618
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4618
CVE-2018-4891
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the XPS module that handles TIFF data. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4619
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4619
CVE-2018-4884
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion engine when processing Enhanced Metafile Format (EMF) data that embeds an image in the bitmap (BMP) file format. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4620
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4620
CVE-2018-4887
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the Unicode mapping module that is invoked when processing Enhanced Metafile Format (EMF) data (during image conversion). A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4621
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4621
CVE-2018-4889
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the XPS image conversion. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4622
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4622
CVE-2018-4893
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of XPS font processing. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4599
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4599
CVE-2018-4883
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs because of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion engine that handles Enhanced Metafile Format (EMF). A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4600
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4600
CVE-2018-4918
Severity:
High
Description:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4601
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4601
CVE-2018-4916
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the JavaScript API related to color conversion. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4602
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4602
CVE-2018-4882
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the string literal parser. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4603
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4603
CVE-2018-4880
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the conversion module that reads U3D data. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4604
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4604
CVE-2018-4881
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module that reads bitmap image file (BMP) data. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4616
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4616
CVE-2018-4886
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation occurs in the image conversion engine when processing Enhanced Metafile Format (EMF) data related to handling of bitmap rectangles. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4617
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4617
CVE-2018-4885
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of Enhanced Metafile Format processing engine (within the image conversion module). A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4624
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4624
CVE-2018-4909
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module when processing metadata in JPEG images. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4625
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4625
CVE-2018-4912
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module that handles JPEG 2000 data. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CISEC:4626
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4626
CVE-2018-4914
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the TIFF processing in the XPS engine. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-04-06
Updated:
2024-01-17

ID:
CVE-2015-9016
Title:
In blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. This could lead to local escalation of privilege....
Type:
Mobile Devices
Bulletins:
CVE-2015-9016
Severity:
Medium
Description:
In blk_mq_tag_to_rq in blk-mq.c in the upstream kernel, there is a possible use after free due to a race condition when a request has been previously freed by blk_mq_complete_request. This could lead to local escalation of privilege. Product: Android. Versions: Android kernel. Android ID: A-63083046.
Applies to:
Created:
2018-04-05
Updated:
2024-01-17

ID:
CVE-2015-9011
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36714882.
Type:
Mobile Devices
Bulletins:
CVE-2015-9011
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36714882.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2014-9953
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36714770.
Type:
Mobile Devices
Bulletins:
CVE-2014-9953
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36714770.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2015-9015
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36714120.
Type:
Mobile Devices
Bulletins:
CVE-2015-9015
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36714120.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2015-9014
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36393750.
Type:
Mobile Devices
Bulletins:
CVE-2015-9014
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36393750.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2015-9009
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36393600.
Type:
Mobile Devices
Bulletins:
CVE-2015-9009
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36393600.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2015-9013
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36393251.
Type:
Mobile Devices
Bulletins:
CVE-2015-9013
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36393251.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2015-9010
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36393101.
Type:
Mobile Devices
Bulletins:
CVE-2015-9010
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36393101.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2014-9956
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36389611.
Type:
Mobile Devices
Bulletins:
CVE-2014-9956
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36389611.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2014-9954
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36388559.
Type:
Mobile Devices
Bulletins:
CVE-2014-9954
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36388559.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2014-9957
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36387564.
Type:
Mobile Devices
Bulletins:
CVE-2014-9957
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36387564.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2014-9958
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36384774.
Type:
Mobile Devices
Bulletins:
CVE-2014-9958
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36384774.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2015-9012
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36384691.
Type:
Mobile Devices
Bulletins:
CVE-2015-9012
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36384691.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2015-9008
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36384689.
Type:
Mobile Devices
Bulletins:
CVE-2015-9008
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36384689.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2014-9955
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36384686.
Type:
Mobile Devices
Bulletins:
CVE-2014-9955
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36384686.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CVE-2014-9959
Title:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36383694.
Type:
Mobile Devices
Bulletins:
CVE-2014-9959
SFBID98874
Severity:
High
Description:
An elevation of privilege vulnerability in Qualcomm closed source components. Product: Android. Versions: Android kernel. Android ID: A-36383694.
Applies to:
Created:
2018-04-04
Updated:
2024-01-17

ID:
CISEC:4169
Title:
Windows Storage Services Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4169
CVE-2018-0826
Severity:
Medium
Description:
Windows Storage Services in Windows 10 versions 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Storage Services Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4170
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:4170
CVE-2018-0827
Severity:
Medium
Description:
Windows Scripting Host (WSH) in Windows 10 versions 1703 and 1709 and Windows Server, version 1709 allows a Device Guard security feature bypass vulnerability due to the way objects are handled in memory, aka "Windows Security Feature Bypass Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4163
Title:
Windows NTFS Global Reparse Point Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4163
CVE-2018-0823
Severity:
Medium
Description:
The Named Pipe File System in Windows 10 version 1709 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way the Named Pipe File System handles objects, aka "Named Pipe File System Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4165
Title:
Windows NTFS Global Reparse Point Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4165
CVE-2018-0822
Severity:
Medium
Description:
NTFS in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way NTFS handles objects, aka "Windows NTFS Global Reparse Point Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4172
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4172
CVE-2018-0756
Severity:
Medium
Description:
The Windows kernel in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Kernel Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0742, CVE-2018-0809, CVE-2018-0820 and CVE-2018-0843.
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4173
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4173
CVE-2018-0757
Severity:
Low
Description:
The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are handled in memory, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0810.
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4174
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4174
CVE-2018-0742
Severity:
Medium
Description:
The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Kernel Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0756. CVE-2018-0809, CVE-2018-0820 and CVE-2018-0843.
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4164
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4164
CVE-2018-0821
Severity:
Medium
Description:
AppContainer in Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way constrained impersonations are handled, aka "Windows AppContainer Elevation Of Privilege Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4166
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4166
CVE-2018-0828
Severity:
Medium
Description:
Windows 10 version 1607 and Windows Server 2016 allow an elevation of privilege vulnerability due to how the MultiPoint management account password is stored, aka "Windows Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4167
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4167
CVE-2018-0833
Severity:
Medium
Description:
The Microsoft Server Message Block 2.0 and 3.0 (SMBv2/SMBv3) client in Windows 8.1 and RT 8.1 and Windows Server 2012 R2 allows a denial of service vulnerability due to how specially crafted requests are handled, aka "SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4161
Title:
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4161
CVE-2018-0846
Severity:
Medium
Description:
The Windows Common Log File System (CLFS) driver in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how objects in memory are handled, aka "Windows Common Log File System Driver Elevation Of Privilege Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4162
Title:
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4162
CVE-2018-0844
Severity:
Medium
Description:
The Windows Common Log File System (CLFS) driver in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how objects in memory are handled, aka "Windows Common Log File System Driver Elevation Of Privilege Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4160
Title:
Vulnerability in Adobe Acrobat/Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4160
CVE-2018-4915
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. The vulnerability is caused by the computation that writes data past the end of the intended buffer; the computation is part of the JavaScript API related to color conversion. An attacker can potentially leverage the vulnerability to corrupt sensitive data or execute arbitrary code.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4168
Title:
StructuredQuery Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4168
CVE-2018-0825
Severity:
High
Description:
StructuredQuery in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a remote code execution vulnerability due to how objects are handled in memory, aka "StructuredQuery Remote Code Execution Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4171
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4171
CVE-2018-0847
Severity:
Medium
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow information disclosure, due to how Internet Explorer handles objects in memory, aka "Internet Explorer Information Disclosure Vulnerability".
Applies to:
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4588
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4588
CVE-2018-4908
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the TTF font processing in the XPS module. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4589
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4589
CVE-2018-4900
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of JavaScript manipulation of an Annotation object. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4590
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4590
CVE-2018-4896
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module that handles Enhanced Metafile Format Plus (EMF+) data. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4591
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4591
CVE-2018-4905
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of TIFF processing within the XPS module. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4592
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4592
CVE-2018-4907
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the TIFF processing in the XPS module. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4593
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4593
CVE-2018-4906
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module that handles Enhanced Metafile Format Plus (EMF+) data related to graphic object image attributes. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4594
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4594
CVE-2018-4899
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the initial XPS page processing. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4595
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4595
CVE-2018-4903
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the TIFF processing within the XPS module. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4596
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4596
CVE-2018-4894
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the XPS font processing. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4597
Title:
Out-of-bounds read vulnerability in Adobe Acrobat Reader 2018.009.20050 and earlier, 2017.011.30070 and earlier, 2015.006.30394 and earlier
Type:
Software
Bulletins:
CISEC:4597
CVE-2018-4897
Severity:
Medium
Description:
An issue was discovered in Adobe Acrobat Reader 2018.009.20050 and earlier versions, 2017.011.30070 and earlier versions, 2015.006.30394 and earlier versions. This vulnerability occurs as a result of computation that reads data that is past the end of the target buffer; the computation is part of the image conversion module that parses TIFF metadata. A successful attack can lead to sensitive data exposure.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4154
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4154
CVE-2018-0869
Severity:
Low
Description:
SharePoint Server 2016 allows an elevation of privilege vulnerability due to how web requests are handled, aka "Microsoft SharePoint Elevation of Privilege Vulnerability".
Applies to:
Microsoft SharePoint Enterprise Server 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4147
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4147
CVE-2018-0864
Severity:
Low
Description:
SharePoint Project Server 2013 and SharePoint Enterprise Server 2016 allow an information disclosure vulnerability due to how web requests are handled, aka "Microsoft SharePoint Information Disclosure Vulnerability".
Applies to:
Microsoft Project Server 2013
Microsoft SharePoint Enterprise Server 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4146
Title:
Microsoft Outlook Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4146
CVE-2018-0852
Severity:
High
Description:
Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1 and RT SP1, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Outlook handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0851.
Applies to:
Microsoft Office 2016
Microsoft Outlook 2007
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4155
Title:
Microsoft Outlook Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4155
CVE-2018-0850
Severity:
Medium
Description:
Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run allow an elevation of privilege vulnerability due to how the format of incoming message is validated, aka "Microsoft Outlook Elevation of Privilege Vulnerability".
Applies to:
Microsoft Office 2016
Microsoft Outlook 2007
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4152
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4152
CVE-2018-0862
Severity:
High
Description:
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4153
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4153
CVE-2018-0851
Severity:
High
Description:
Microsoft Office 2007 SP2, Microsoft Office Word Viewer, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Office handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0852.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Word Viewer
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4156
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4156
CVE-2018-0849
Severity:
High
Description:
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4149
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4149
CVE-2018-0845
Severity:
High
Description:
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4150
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4150
CVE-2018-0848
Severity:
High
Description:
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4148
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4148
CVE-2018-0853
Severity:
Medium
Description:
Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow an information disclosure vulnerability, due to how Office initializes the affected variable, aka "Microsoft Office Information Disclosure Vulnerability".
Applies to:
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CISEC:4151
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:4151
CVE-2018-0841
Severity:
High
Description:
Microsoft Office 2016 Click-to-Run allows a remote code execution vulnerability due to how objects are handled in memory, aka "Office Remote Code Execution Vulnerability"
Applies to:
Microsoft Excel 2016
Microsoft Office 2016
Created:
2018-03-30
Updated:
2024-01-17

ID:
CVE-2014-4959
Title:
**DISPUTED** SQL injection vulnerability in SQLiteDatabase.java in the SQLi Api in Android allows remote attackers to execute arbitrary SQL commands via the delete method.
Type:
Mobile Devices
Bulletins:
CVE-2014-4959
SFBID68912
Severity:
High
Description:
**DISPUTED** SQL injection vulnerability in SQLiteDatabase.java in the SQLi Api in Android allows remote attackers to execute arbitrary SQL commands via the delete method.
Applies to:
Created:
2018-03-27
Updated:
2024-01-17

ID:
CISEC:4127
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4127
CVE-2018-0810
Severity:
Low
Description:
The Windows kernel in Windows 7 SP1, Windows Server 2008 SP2 and R2, and Windows Server 2012 allows an information disclosure vulnerability due to the way memory is initialized, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0757.
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4133
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4133
CVE-2018-0829
Severity:
Low
Description:
The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how objects in memory are handled, aka "Windows Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0830 and CVE-2018-0832.
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4135
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4135
CVE-2018-0830
Severity:
Low
Description:
The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how objects in memory are handled, aka "Windows Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0829 and CVE-2018-0832.
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4136
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4136
CVE-2018-0831
Severity:
Medium
Description:
The Windows kernel in Windows 10 versions 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to how objects in memory are handled, aka "Windows Kernel Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4137
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4137
CVE-2018-0843
Severity:
Low
Description:
The Windows kernel in Windows 10 version 1709 and Windows Server, version 1709 allows an information disclosure vulnerability due to how objects in memory are handled, aka "Windows Kernel Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0742, CVE-2018-0756, CVE-2018-0809 and CVE-2018-0820.
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4139
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4139
CVE-2018-0832
Severity:
Low
Description:
The Windows kernel in Windows 8.1 and RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to how objects in memory are handled, aka "Windows Information Disclosure Vulnerability". This CVE is unique from CVE-2018-0829 and CVE-2018-0830.
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4125
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4125
CVE-2018-0809
Severity:
Medium
Description:
The Windows kernel in Windows 10, versions 1703 and 1709, and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0742, CVE-2018-0756, CVE-2018-0820 and CVE-2018-0843.
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4134
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4134
CVE-2018-0842
Severity:
Medium
Description:
Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow an elevation of privilege vulnerability due to how objects in memory are handled, aka "Windows Kernel Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4138
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:4138
CVE-2018-0820
Severity:
Medium
Description:
The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Kernel Elevation Of Privilege Vulnerability". This CVE is unique from CVE-2018-0742, CVE-2018-0756, CVE-2018-0809 and CVE-2018-0843.
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4142
Title:
Windows EOT Font Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4142
CVE-2018-0855
Severity:
Medium
Description:
The Microsoft Windows Embedded OpenType (EOT) font engine in Microsoft Windows 7 SP1 and Windows Server 2008 R2 allows information disclosure, due to how the Windows EOT font engine handles embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability".
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4143
Title:
Windows EOT Font Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4143
CVE-2018-0761
Severity:
Low
Description:
The Microsoft Windows Embedded OpenType (EOT) font engine in Microsoft Windows 7 SP1 and Windows Server 2008 R2 allows information disclosure, due to how the Windows EOT font engine handles embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability".
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4144
Title:
Windows EOT Font Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4144
CVE-2018-0760
Severity:
Low
Description:
The Microsoft Windows Embedded OpenType (EOT) font engine in Microsoft Windows 7 SP1, Windows Server 2008 R2, and Windows Server 2012 allows information disclosure, due to how the Windows EOT font engine handles embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability".
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4145
Title:
Windows EOT Font Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4145
CVE-2018-0755
Severity:
Low
Description:
The Microsoft Windows Embedded OpenType (EOT) font engine in Microsoft Windows 7 SP1 and Windows Server 2008 R2 allows information disclosure, due to how the Windows EOT font engine handles embedded fonts, aka "Windows EOT Font Engine Information Disclosure Vulnerability"
Applies to:
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4140
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4140
CVE-2018-0840
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4141
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4141
CVE-2018-0866
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, and CVE-2018-0861.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4121
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4121
CVE-2018-0835
Severity:
High
Description:
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4122
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4122
CVE-2018-0857
Severity:
High
Description:
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4123
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4123
CVE-2018-0859
Severity:
High
Description:
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4124
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4124
CVE-2018-0836
Severity:
High
Description:
Microsoft Edge and ChakraCore in Microsoft Windows 10 1703 and 1709 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4126
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4126
CVE-2018-0856
Severity:
High
Description:
Microsoft Edge and ChakraCore in Microsoft Windows 10 1703 and 1709 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4128
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4128
CVE-2018-0860
Severity:
High
Description:
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4129
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4129
CVE-2018-0861
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4130
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4130
CVE-2018-0837
Severity:
High
Description:
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4131
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4131
CVE-2018-0838
Severity:
High
Description:
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4132
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4132
CVE-2018-0858
Severity:
High
Description:
ChakraCore allows remote code execution, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0834, CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-23
Updated:
2024-01-17

ID:
CISEC:4088
Title:
XSS in DevTools
Type:
Web
Bulletins:
CISEC:4088
CVE-2018-6039
Severity:
Medium
Description:
XSS in DevTools.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4066
Title:
WCP dissector crash
Type:
Software
Bulletins:
CISEC:4066
CVE-2018-5335
Severity:
Medium
Description:
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.
Applies to:
Wireshark
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4077
Title:
Use after free in WebUI
Type:
Web
Bulletins:
CISEC:4077
CVE-2018-6054
Severity:
Medium
Description:
Use after free in WebUI.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4089
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:4089
CVE-2018-6031
Severity:
Medium
Description:
Use after free in PDFium.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4076
Title:
URL spoof in OmniBox
Type:
Web
Bulletins:
CISEC:4076
CVE-2018-6042
Severity:
Medium
Description:
URL spoof in OmniBox.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4078
Title:
URL spoof in OmniBox
Type:
Web
Bulletins:
CISEC:4078
CVE-2018-6050
Severity:
Medium
Description:
URL spoof in OmniBox.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4091
Title:
URL spoof in Navigation
Type:
Web
Bulletins:
CISEC:4091
CVE-2018-6041
Severity:
Medium
Description:
URL spoof in Navigation.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4072
Title:
UI spoof in Permissions
Type:
Web
Bulletins:
CISEC:4072
CVE-2018-6049
Severity:
Medium
Description:
UI spoof in Permissions.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4106
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:4106
CVE-2018-0834
Severity:
High
Description:
Microsoft Edge and ChakraCore in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows remote code execution, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0835, CVE-2018-0836, CVE-2018-0837, CVE-2018-0838, CVE-2018-0840, CVE-2018-0856, CVE-2018-0857, CVE-2018-0858, CVE-2018-0859, CVE-2018-0860, CVE-2018-0861, and CVE-2018-0866.
Applies to:
Microsoft Edge
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4086
Title:
Same origin bypass in Shared Worker
Type:
Web
Bulletins:
CISEC:4086
CVE-2018-6032
Severity:
Medium
Description:
Same origin bypass in Shared Worker.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4073
Title:
Referrer policy bypass in Blink
Type:
Web
Bulletins:
CISEC:4073
CVE-2018-6048
Severity:
Medium
Description:
Referrer policy bypass in Blink.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4087
Title:
Referrer leak in XSS Auditor
Type:
Web
Bulletins:
CISEC:4087
CVE-2018-6051
Severity:
Medium
Description:
Referrer leak in XSS Auditor.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4070
Title:
Race when opening downloaded files
Type:
Web
Bulletins:
CISEC:4070
CVE-2018-6033
Severity:
Medium
Description:
Race when opening downloaded files.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4065
Title:
Multiple dissectors could crash
Type:
Software
Bulletins:
CISEC:4065
CVE-2018-5336
Severity:
Medium
Description:
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.
Applies to:
Wireshark
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4107
Title:
Microsoft Edge Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:4107
CVE-2018-0771
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1607, 1703, and Windows Server 2016 allows a security feature bypass, due to how Edge handles different-origin requests, aka "Microsoft Edge Security Feature Bypass".
Applies to:
Microsoft Edge
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4108
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4108
CVE-2018-0763
Severity:
Low
Description:
Microsoft Edge in Microsoft Windows 10 1703 and 1709 allows information disclosure, due to how Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0839.
Applies to:
Microsoft Edge
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4109
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4109
CVE-2018-0839
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1703 allows information disclosure, due to how Edge handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0763.
Applies to:
Microsoft Edge
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4075
Title:
Leak of page thumbnails in New Tab Page
Type:
Web
Bulletins:
CISEC:4075
CVE-2018-6053
Severity:
Medium
Description:
Leak of page thumbnails in New Tab Page.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4064
Title:
IxVeriWave file parser crash
Type:
Software
Bulletins:
CISEC:4064
CVE-2018-5334
Severity:
Medium
Description:
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.
Applies to:
Wireshark
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4074
Title:
Integer underflow in WebAssembly
Type:
Web
Bulletins:
CISEC:4074
CVE-2018-6036
Severity:
Medium
Description:
Integer underflow in WebAssembly.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4069
Title:
Integer overflow in Blink
Type:
Web
Bulletins:
CISEC:4069
CVE-2018-6034
Severity:
Medium
Description:
Integer overflow in Blink.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4079
Title:
Insufficient user gesture requirements in autofill
Type:
Web
Bulletins:
CISEC:4079
CVE-2018-6037
Severity:
Medium
Description:
Insufficient user gesture requirements in autofill.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4081
Title:
Insufficient isolation of devtools from extensions
Type:
Web
Bulletins:
CISEC:4081
CVE-2018-6045
Severity:
Medium
Description:
Insufficient isolation of devtools from extensions.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4082
Title:
Insufficient isolation of devtools from extensions
Type:
Web
Bulletins:
CISEC:4082
CVE-2018-6035
Severity:
Medium
Description:
Insufficient isolation of devtools from extensions.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4084
Title:
Insufficient isolation of devtools from extensions
Type:
Web
Bulletins:
CISEC:4084
CVE-2018-6046
Severity:
Medium
Description:
Insufficient isolation of devtools from extensions.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4085
Title:
Insufficient escaping with external URL handlers
Type:
Web
Bulletins:
CISEC:4085
CVE-2018-6043
Severity:
Medium
Description:
Insufficient escaping with external URL handlers.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4071
Title:
Incomplete no-referrer policy implementation
Type:
Web
Bulletins:
CISEC:4071
CVE-2018-6052
Severity:
Medium
Description:
Incomplete no-referrer policy implementation.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4068
Title:
ImageMagick memory leaks in MontageImageCommand in MagickWand/montage
Type:
Software
Bulletins:
CISEC:4068
CVE-2017-18022
Severity:
Medium
Description:
In ImageMagick 7.0.7-12 Q16, there are memory leaks in MontageImageCommand in MagickWand/montage.c.
Applies to:
ImageMagick
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4103
Title:
ImageMagick memory leak vulnerability
Type:
Software
Bulletins:
CISEC:4103
CVE-2017-18029
Severity:
Medium
Description:
In ImageMagick 7.0.6-10 Q16, a memory leak vulnerability was found in the function ReadMATImage in coders/mat.c, which allow remote attackers to cause a denial of service via a crafted file.
Applies to:
ImageMagick
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4105
Title:
ImageMagick memory exhaustion vulnerability
Type:
Software
Bulletins:
CISEC:4105
CVE-2017-18028
Severity:
High
Description:
In ImageMagick 7.0.7-1 Q16, a memory exhaustion vulnerability was found in the function ReadTIFFImage in coders/tiff.c, which allow remote attackers to cause a denial of service via a crafted file.
Applies to:
ImageMagick
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4067
Title:
ImageMagick CPU exhaustion vulnerability
Type:
Software
Bulletins:
CISEC:4067
CVE-2017-1000476
Severity:
High
Description:
ImageMagick 7.0.7-12 Q16, a CPU exhaustion vulnerability was found in the function ReadDDSInfo in coders/dds.c, which allows attackers to cause a denial of service.
Applies to:
ImageMagick
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4104
Title:
ImageMagick CPU exhaustion vulnerability
Type:
Software
Bulletins:
CISEC:4104
CVE-2017-1000445
Severity:
Medium
Description:
ImageMagick 7.0.7-1 and older version are vulnerable to null pointer dereference in the MagickCore component and might lead to denial of service.
Applies to:
ImageMagick
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4096
Title:
IBM WebSphere MQ is affected by a privilege escalation vulnerability
Type:
Software
Bulletins:
CISEC:4096
CVE-2017-1612
Severity:
Medium
Description:
IBM WebSphere MQ 7.0, 7.1, 7.5, 8.0, and 9.0 service trace module could be used to execute untrusted code under 'mqm' user. IBM X-Force ID: 132953.
Applies to:
IBM WebSphere MQ
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4095
Title:
IBM MQ is affected by a potential denial of service to channel processes
Type:
Software
Bulletins:
CISEC:4095
CVE-2017-1557
Severity:
Medium
Description:
IBM WebSphere MQ 8.0 and 9.0 could allow an authenticated user with authority to send a specially crafted request that could cause a channel process to cease processing further requests. IBM X-Force ID: 131547.
Applies to:
IBM WebSphere MQ
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4092
Title:
IBM MQ could allow an authenticated user to insert messages with malformed data into the channel, which would cause it to restart
Type:
Software
Bulletins:
CISEC:4092
CVE-2017-1433
Severity:
Medium
Description:
IBM WebSphere MQ 7.5, 8.0, and 9.0 could allow an authenticated user to insert messages with a corrupt RFH header into the channel which would cause it to restart. IBM X-Force ID: 127803.
Applies to:
IBM WebSphere MQ
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4093
Title:
IBM MQ and IBM MQ Appliance MQOPEN call might succeed when it should have failed
Type:
Software
Bulletins:
CISEC:4093
CVE-2017-1341
Severity:
Medium
Description:
IBM WebSphere MQ 8.0 and 9.0 could allow, under special circumstances, an unauthorized user to access an object which they should have been denied access. IBM X-Force ID: 126456.
Applies to:
IBM WebSphere MQ
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4094
Title:
IBM MQ and IBM MQ Appliance could allow a local user to crash the queue manager agent thread and expose some sensitive information
Type:
Software
Bulletins:
CISEC:4094
CVE-2017-1760
Severity:
Low
Description:
IBM WebSphere MQ 7.5, 8.0, and 9.0 could allow a local user to crash the queue manager agent thread and expose some sensitive information. IBM X-Force ID: 126454.
Applies to:
IBM WebSphere MQ
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4090
Title:
Heap buffer overflow in WebGL
Type:
Web
Bulletins:
CISEC:4090
CVE-2018-6038
Severity:
Medium
Description:
Heap buffer overflow in WebGL.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4083
Title:
Cross origin URL leak in WebGL
Type:
Web
Bulletins:
CISEC:4083
CVE-2018-6047
Severity:
Medium
Description:
Cross origin URL leak in WebGL.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4080
Title:
Content security policy bypass
Type:
Web
Bulletins:
CISEC:4080
CVE-2018-6040
Severity:
Medium
Description:
Content security policy bypass.
Applies to:
Google Chrome
Created:
2018-03-16
Updated:
2024-01-17

ID:
CISEC:4040
Title:
Stack overflow in V8
Type:
Web
Bulletins:
CISEC:4040
CVE-2017-15406
Severity:
Medium
Description:
Stack overflow in V8.
Applies to:
Google Chrome
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4025
Title:
OpenSSL Security Bypass Vulnerability
Type:
Services
Bulletins:
CISEC:4025
CVE-2017-3738
Severity:
Medium
Description:
There is an overflow bug in the AVX2 Montgomery multiplication procedure used in exponentiation with 1024-bit moduli. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH1024 are considered just feasible, because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH1024 private key among multiple clients, which is no longer an option since CVE-2016-0701. This only affects processors that support the AVX2 but not ADX extensions like Intel Haswell (4th generation). Note: The impact from this issue is similar to CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version 1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n. Due to the low severity of this issue we are not issuing a new release of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL 1.1.0h when it becomes available. The fix is also available in commit e502cc86d in the OpenSSL git repository.
Applies to:
OpenSSL
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4026
Title:
OpenSSL Security Bypass Vulnerability
Type:
Services
Bulletins:
CISEC:4026
CVE-2017-3736
Severity:
Medium
Description:
There is a carry propagating bug in the x86_64 Montgomery squaring procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC algorithms are affected. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be very significant and likely only accessible to a limited number of attackers. An attacker would additionally need online access to an unpatched system using the target private key in a scenario with persistent DH parameters and a private key that is shared between multiple clients. This only affects processors that support the BMI1, BMI2 and ADX extensions like Intel Broadwell (5th generation) and later or AMD Ryzen.
Applies to:
OpenSSL
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4027
Title:
OpenSSL Security Bypass Vulnerability
Type:
Services
Bulletins:
CISEC:4027
CVE-2017-3737
Severity:
Medium
Description:
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error state" mechanism. The intent was that if a fatal error occurred during a handshake then OpenSSL would move into the error state and would immediately fail if you attempted to continue the handshake. This works as designed for the explicit handshake functions (SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a bug it does not work correctly if SSL_read() or SSL_write() is called directly. In that scenario, if the handshake fails then a fatal error will be returned in the initial function call. If SSL_read()/SSL_write() is subsequently called by the application for the same SSL object then it will succeed and the data is passed without being decrypted/encrypted directly from the SSL/TLS record layer. In order to exploit this issue an application bug would have to be present that resulted in a call to SSL_read()/SSL_write() being issued after having already received a fatal error. OpenSSL version 1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is not affected.
Applies to:
OpenSSL
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4059
Title:
ImageMagick Memory Leaks Vulnerability
Type:
Software
Bulletins:
CISEC:4059
CVE-2018-5358
Severity:
Medium
Description:
ImageMagick 7.0.7-22 Q16 has memory leaks in the EncodeImageAttributes function in coders/json.c, as demonstrated by the ReadPSDLayersInternal function in coders/psd.c.
Applies to:
ImageMagick
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4060
Title:
ImageMagick memory leaks in ReadPWPImage
Type:
Software
Bulletins:
CISEC:4060
CVE-2017-18008
Severity:
Medium
Description:
In ImageMagick 7.0.7-17 Q16, there is a Memory Leak in ReadPWPImage in coders/pwp.c.
Applies to:
ImageMagick
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4063
Title:
ImageMagick Memory Leaks
Type:
Software
Bulletins:
CISEC:4063
CVE-2018-5247
Severity:
Medium
Description:
In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadRLAImage in coders/rla.c.
Applies to:
ImageMagick
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4058
Title:
ImageMagick Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4058
CVE-2018-5357
Severity:
Medium
Description:
ImageMagick 7.0.7-22 Q16 has memory leaks in the ReadDCMImage function in coders/dcm.c.
Applies to:
ImageMagick
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4061
Title:
ImageMagick Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:4061
CVE-2018-5246
Severity:
Medium
Description:
In ImageMagick 7.0.7-17 Q16, there are memory leaks in ReadPATTERNImage in coders/pattern.c.
Applies to:
ImageMagick
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4062
Title:
ImageMagick heap buffer overflow in sixel_decode
Type:
Software
Bulletins:
CISEC:4062
CVE-2018-5248
Severity:
Medium
Description:
In ImageMagick 7.0.7-17 Q16, there is a heap-based buffer over-read in coders/sixel.c in the ReadSIXELImage function, related to the sixel_decode function.
Applies to:
ImageMagick
Created:
2018-03-09
Updated:
2024-01-17

ID:
CISEC:4019
Title:
Use after free in V8
Type:
Web
Bulletins:
CISEC:4019
CVE-2017-15399
Severity:
High
Description:
Use after free in V8.
Applies to:
Google Chrome
Created:
2018-03-02
Updated:
2024-01-17

ID:
CISEC:4010
Title:
Universal Cross-Site Scripting in V8
Type:
Web
Bulletins:
CISEC:4010
CVE-2017-15429
Severity:
Medium
Description:
Universal Cross-Site Scripting in V8.
Applies to:
Google Chrome
Created:
2018-03-02
Updated:
2024-01-17

ID:
CISEC:4018
Title:
Stack buffer overflow in QUIC
Type:
Web
Bulletins:
CISEC:4018
CVE-2017-15398
Severity:
High
Description:
Stack buffer overflow in QUIC.
Applies to:
Google Chrome
Created:
2018-03-02
Updated:
2024-01-17

ID:
CISEC:4011
Title:
Out of bounds read in V8
Type:
Web
Bulletins:
CISEC:4011
CVE-2017-15428
Severity:
Medium
Description:
Out of bounds read in V8.
Applies to:
Google Chrome
Created:
2018-03-02
Updated:
2024-01-17

ID:
CISEC:3921
Title:
Windows IPSec Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:3921
CVE-2018-0753
Severity:
High
Description:
Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow a denial of service vulnerability due to the way objects are handled in memory, aka "Windows IPSec Denial of Service Vulnerability".
Applies to:
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3913
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3913
CVE-2018-0750
Severity:
Low
Description:
The Windows GDI component in Windows 7 SP1 and Windows Server 2008 SP2 and R2 SP1 allows an information disclosure vulnerability due to the way objects are handled in memory, aka "Windows Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3914
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3914
CVE-2018-0751
Severity:
Low
Description:
The Windows Kernel API in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way the Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2018-0752.
Applies to:
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3920
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3920
CVE-2018-0752
Severity:
Medium
Description:
The Windows Kernel API in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way the Kernel API enforces permissions, aka "Windows Elevation of Privilege Vulnerability". This CVE ID is unique from CVE-2018-0751.
Applies to:
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3982
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure
Type:
Software
Bulletins:
CISEC:3982
CVE-2018-2583
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Stored Procedure). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. While the vulnerability is in MySQL Server, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3993
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication
Type:
Software
Bulletins:
CISEC:3993
CVE-2018-2647
Severity:
High
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Replication). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3987
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema
Type:
Software
Bulletins:
CISEC:3987
CVE-2018-2590
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3998
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema
Type:
Software
Bulletins:
CISEC:3998
CVE-2018-2645
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Performance Schema). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all MySQL Server accessible data.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:4001
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging (OpenSSL
Type:
Software
Bulletins:
CISEC:4001
CVE-2017-3737
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Packaging (OpenSSL)).
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3988
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:3988
CVE-2018-2640
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3991
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:3991
CVE-2018-2665
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3992
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:3992
CVE-2018-2667
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3995
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:3995
CVE-2018-2600
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3996
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer
Type:
Software
Bulletins:
CISEC:3996
CVE-2018-2668
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: Optimizer). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3985
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB
Type:
Software
Bulletins:
CISEC:3985
CVE-2018-2565
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: InnoDB). Supported versions that are affected are 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3990
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: GIS
Type:
Software
Bulletins:
CISEC:3990
CVE-2018-2573
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: GIS). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3983
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML
Type:
Software
Bulletins:
CISEC:3983
CVE-2018-2646
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3986
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML
Type:
Software
Bulletins:
CISEC:3986
CVE-2018-2576
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:4000
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML
Type:
Software
Bulletins:
CISEC:4000
CVE-2018-2586
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DML). Supported versions that are affected are 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3989
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL
Type:
Software
Bulletins:
CISEC:3989
CVE-2018-2622
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server: DDL). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3981
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges
Type:
Software
Bulletins:
CISEC:3981
CVE-2018-2696
Severity:
High
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3984
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges
Type:
Software
Bulletins:
CISEC:3984
CVE-2018-2703
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Security : Privileges). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3997
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition
Type:
Software
Bulletins:
CISEC:3997
CVE-2018-2591
Severity:
Medium
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3999
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition
Type:
Software
Bulletins:
CISEC:3999
CVE-2018-2562
Severity:
High
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: Server : Partition). Supported versions that are affected are 5.5.58 and prior, 5.6.38 and prior and 5.7.19 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3994
Title:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB
Type:
Software
Bulletins:
CISEC:3994
CVE-2018-2612
Severity:
High
Description:
Vulnerability in the MySQL Server component of Oracle MySQL (subcomponent: InnoDB). Supported versions that are affected are 5.6.38 and prior and 5.7.20 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all MySQL Server accessible data and unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server.
Applies to:
MySQL Server
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3960
Title:
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization
Type:
Software
Bulletins:
CISEC:3960
CVE-2018-2657
Severity:
Medium
Description:
Vulnerability in the Java SE, JRockit component of Oracle Java SE (subcomponent: Serialization). Supported versions that are affected are Java SE: 6u171 and 7u161; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, JRockit.
Applies to:
JRockit
Java Development Kit 1.6
Java Development Kit 1.7
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3908
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3908
CVE-2018-2629
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3909
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3909
CVE-2018-2637
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JMX). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded, JRockit accessible data as well as unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service. CVSS 3.0 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3910
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3910
CVE-2018-2599
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.8 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3911
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3911
CVE-2018-2618
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JCE). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3912
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3912
CVE-2018-2633
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 8.3 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3903
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3903
CVE-2018-2603
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3904
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3904
CVE-2018-2588
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: LDAP). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3905
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3905
CVE-2018-2678
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: JNDI). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3906
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3906
CVE-2018-2663
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Libraries). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151; JRockit: R28.3.16. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded, JRockit. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded, JRockit. Note: This vulnerability applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3907
Title:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE
Type:
Software
Bulletins:
CISEC:3907
CVE-2018-2579
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded, JRockit component of Oracle Java SE (subcomponent: Networking). Supported versions that are affected are Java SE: 6u161, 7u151, 8u144 and 9; Java SE Embedded: 8u144; JRockit: R28.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Java SE, Java SE Embedded, JRockit. While the vulnerability is in Java SE, Java SE Embedded, JRockit, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded, JRockit accessible data. Note: This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 4.0 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N).
Applies to:
JRockit R28
Java Development Kit 6
Java Development Kit 7
Java Development Kit 8
Java Development Kit 9
Java Runtime Environment 6
Java Runtime Environment 7
Java Runtime Environment 8
Java Runtime Environment 9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3958
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS
Type:
Software
Bulletins:
CISEC:3958
CVE-2018-2634
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: JGSS). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. While the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3954
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n
Type:
Software
Bulletins:
CISEC:3954
CVE-2018-2602
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: I18n). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Java SE, Java SE Embedded executes to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data as well as unauthorized read access to a subset of Java SE, Java SE Embedded accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3953
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot
Type:
Software
Bulletins:
CISEC:3953
CVE-2018-2582
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: Hotspot). Supported versions that are affected are Java SE: 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data.
Applies to:
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3957
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT
Type:
Software
Bulletins:
CISEC:3957
CVE-2018-2641
Severity:
Low
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, Java SE Embedded, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3951
Title:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT
Type:
Software
Bulletins:
CISEC:3951
CVE-2018-2677
Severity:
Medium
Description:
Vulnerability in the Java SE, Java SE Embedded component of Oracle Java SE (subcomponent: AWT). Supported versions that are affected are Java SE: 6u171, 7u161, 8u152 and 9.0.1; Java SE Embedded: 8u151. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
Applies to:
Java Development Kit 1.6
Java Development Kit 1.7
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.6
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3955
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX
Type:
Software
Bulletins:
CISEC:3955
CVE-2018-2581
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: JavaFX). Supported versions that are affected are Java SE: 7u161, 8u152 and 9.0.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Java SE accessible data.
Applies to:
Java Development Kit 1.7
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.7
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3952
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Installer
Type:
Software
Bulletins:
CISEC:3952
CVE-2018-2627
Severity:
Low
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Installer). Supported versions that are affected are Java SE: 8u152 and 9.0.1. Difficult to exploit vulnerability allows low privileged attacker with logon to the infrastructure where Java SE executes to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE.
Applies to:
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3956
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment
Type:
Software
Bulletins:
CISEC:3956
CVE-2018-2638
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u152 and 9.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
Applies to:
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3959
Title:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment
Type:
Software
Bulletins:
CISEC:3959
CVE-2018-2639
Severity:
Medium
Description:
Vulnerability in the Java SE component of Oracle Java SE (subcomponent: Deployment). Supported versions that are affected are Java SE: 8u152 and 9.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE. Successful attacks require human interaction from a person other than the attacker and while the vulnerability is in Java SE, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in takeover of Java SE. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
Applies to:
Java Development Kit 1.8
Java Development Kit 1.9
Java Runtime Environment 1.8
Java Runtime Environment 1.9
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3947
Title:
Use of uninitialized value in Skia
Type:
Web
Bulletins:
CISEC:3947
CVE-2017-15418
Severity:
Medium
Description:
Use of uninitialized value in Skia.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3937
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:3937
CVE-2017-15410
Severity:
Medium
Description:
Use after free in PDFium.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3949
Title:
Use after free in PDFium
Type:
Web
Bulletins:
CISEC:3949
CVE-2017-15411
Severity:
Medium
Description:
Use after free in PDFium.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3930
Title:
Use after free in libXML
Type:
Web
Bulletins:
CISEC:3930
CVE-2017-15412
Severity:
Medium
Description:
Use after free in libXML.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3942
Title:
URL spoofing in Omnibox
Type:
Web
Bulletins:
CISEC:3942
CVE-2017-15420
Severity:
Medium
Description:
URL spoofing in Omnibox.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3933
Title:
URL Spoof in Omnibox
Type:
Web
Bulletins:
CISEC:3933
CVE-2017-15424
Severity:
Medium
Description:
URL Spoof in Omnibox.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3935
Title:
URL Spoof in Omnibox
Type:
Web
Bulletins:
CISEC:3935
CVE-2017-15425
Severity:
Medium
Description:
URL Spoof in Omnibox.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3946
Title:
URL Spoof in Omnibox
Type:
Web
Bulletins:
CISEC:3946
CVE-2017-15426
Severity:
Medium
Description:
URL Spoof in Omnibox.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3939
Title:
Unsafe navigation in Chromecast Plugin
Type:
Web
Bulletins:
CISEC:3939
CVE-2017-15430
Severity:
Medium
Description:
Unsafe navigation in Chromecast Plugin.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3936
Title:
Type confusion in WebAssembly
Type:
Web
Bulletins:
CISEC:3936
CVE-2017-15413
Severity:
Medium
Description:
Type confusion in WebAssembly.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3902
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3902
CVE-2018-0800
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 1709 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0767 and CVE-2018-0780.
Applies to:
Microsoft Edge
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3925
Title:
Rogue Data Cache Load Vulnerability
Type:
Software
Bulletins:
CISEC:3925
CVE-2017-5754
Severity:
Medium
Description:
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Applies to:
Microsoft Egde
Microsoft Internet Explorer 11
Microsoft SQL Server 2016
Microsoft SQL Server 2017
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3941
Title:
Pointer information disclosure in IPC call
Type:
Web
Bulletins:
CISEC:3941
CVE-2017-15415
Severity:
Medium
Description:
Pointer information disclosure in IPC call.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3940
Title:
Out of bounds write in Skia
Type:
Web
Bulletins:
CISEC:3940
CVE-2017-15409
Severity:
Medium
Description:
Out of bounds write in Skia.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3934
Title:
Out of bounds write in QUIC
Type:
Web
Bulletins:
CISEC:3934
CVE-2017-15407
Severity:
Medium
Description:
Out of bounds write in QUIC.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3931
Title:
Out of bounds read in Blink
Type:
Web
Bulletins:
CISEC:3931
CVE-2017-15416
Severity:
Medium
Description:
Out of bounds read in Blink.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3918
Title:
OpenType Font Driver Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3918
CVE-2018-0754
Severity:
Low
Description:
The Windows Adobe Type Manager Font Driver (Atmfd.dll) in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are handled in memory, aka "OpenType Font Driver Information Disclosure Vulnerability".
Applies to:
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3919
Title:
OpenType Font Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3919
CVE-2018-0788
Severity:
Medium
Description:
The Windows Adobe Type Manager Font Driver (Atmfd.dll) in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, and Windows Server 2012 and R2 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "OpenType Font Driver Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3932
Title:
Issue with SPAKE implementation in BoringSSL
Type:
Web
Bulletins:
CISEC:3932
CVE-2017-15423
Severity:
Medium
Description:
Issue with SPAKE implementation in BoringSSL.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3948
Title:
Integer overflow in ICU
Type:
Web
Bulletins:
CISEC:3948
CVE-2017-15422
Severity:
Medium
Description:
Integer overflow in ICU.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3938
Title:
Insufficient blocking of JavaScript in Omnibox
Type:
Web
Bulletins:
CISEC:3938
CVE-2017-15427
Severity:
Medium
Description:
Insufficient blocking of JavaScript in Omnibox.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3945
Title:
Heap buffer overflow in PDFium
Type:
Web
Bulletins:
CISEC:3945
CVE-2017-15408
Severity:
Medium
Description:
Heap buffer overflow in PDFium.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3915
Title:
Guidance to mitigate speculative execution side-channel vulnerabilities
Type:
Software
Bulletins:
CISEC:3915
CVE-2017-5753
Severity:
Medium
Description:
Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Applies to:
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3950
Title:
Cross origin leak of redirect URL in Blink
Type:
Web
Bulletins:
CISEC:3950
CVE-2017-15419
Severity:
Medium
Description:
Cross origin leak of redirect URL in Blink.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3944
Title:
Cross origin information disclosure in Skia
Type:
Web
Bulletins:
CISEC:3944
CVE-2017-15417
Severity:
Low
Description:
Cross origin information disclosure in Skia.
Applies to:
Google Chrome
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3924
Title:
Branch Target Injection Vulnerability
Type:
Software
Bulletins:
CISEC:3924
CVE-2017-5715
Severity:
Low
Description:
Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
Applies to:
Microsoft Egde
Microsoft Internet Explorer 11
Microsoft SQL Server 2016
Microsoft SQL Server 2017
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3928
Title:
.NET Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3928
CVE-2018-0786
Severity:
Medium
Description:
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, and 4.7 and .NET Core 1.0 and 2.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability".
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3927
Title:
.NET and .NET Core Denial Of Service Vulnerability
Type:
Software
Bulletins:
CISEC:3927
CVE-2018-0764
Severity:
Medium
Description:
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765.
Applies to:
Microsoft .NET Framework 2.0
Microsoft .NET Framework 3.0
Microsoft .NET Framework 3.5
Microsoft .NET Framework 3.5.1
Microsoft .NET Framework 4.0
Microsoft .NET Framework 4.5
Created:
2018-02-23
Updated:
2024-01-17

ID:
CISEC:3900
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3900
CVE-2018-0749
Severity:
Medium
Description:
The Microsoft Server Message Block (SMB) Server in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way SMB Server handles specially crafted files, aka "Windows Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3890
Title:
Microsoft Word Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3890
CVE-2018-0806
Severity:
High
Description:
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0807.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3891
Title:
Microsoft Word Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3891
CVE-2018-0805
Severity:
High
Description:
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0806, and CVE-2018-0807.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3892
Title:
Microsoft Word Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3892
CVE-2018-0807
Severity:
High
Description:
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0804, CVE-2018-0805, and CVE-2018-0806.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3896
Title:
Microsoft Word Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3896
CVE-2018-0804
Severity:
High
Description:
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0805, CVE-2018-0806, and CVE-2018-0807.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3893
Title:
Microsoft Word Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3893
CVE-2018-0812
Severity:
High
Description:
Equation Editor in Microsoft Office 2003, Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Memory Corruption Vulnerability".
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3901
Title:
Microsoft Word Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3901
CVE-2018-0797
Severity:
High
Description:
Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way RTF content is handled, aka "Microsoft Word Memory Corruption Vulnerability".
Applies to:
Microsoft Office 2010
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft Office Web Apps 2013
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Microsoft Word Viewer
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3889
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3889
CVE-2018-0801
Severity:
High
Description:
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3898
Title:
Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3898
CVE-2018-0795
Severity:
High
Description:
Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability".
Applies to:
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3894
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3894
CVE-2018-0802
Severity:
High
Description:
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0797 and CVE-2018-0812.
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3895
Title:
Microsoft Office Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3895
CVE-2018-0798
Severity:
High
Description:
Equation Editor in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Memory Corruption Vulnerability".
Applies to:
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3899
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3899
CVE-2018-0796
Severity:
High
Description:
Microsoft Excel in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Excel Remote Code Execution Vulnerability".
Applies to:
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel Viewer
Microsoft Office Compatibility Pack
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3897
Title:
Microsoft Access Tampering Vulnerability
Type:
Software
Bulletins:
CISEC:3897
CVE-2018-0799
Severity:
Medium
Description:
Microsoft Access in Microsoft SharePoint Enterprise Server 2013 and Microsoft SharePoint Enterprise Server 2016 allows a cross-site-scripting (XSS) vulnerability due to the way image field values are handled, aka "Microsoft Access Tampering Vulnerability".
Applies to:
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-02-16
Updated:
2024-01-17

ID:
CISEC:3872
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3872
CVE-2018-0743
Severity:
Medium
Description:
Windows Subsystem for Linux in Windows 10 version 1703, Windows 10 version 1709, and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Subsystem for Linux Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3883
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3883
CVE-2018-0746
Severity:
Low
Description:
The Windows kernel in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0745 and CVE-2018-0747.
Applies to:
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3884
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3884
CVE-2018-0747
Severity:
Low
Description:
The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an information disclosure vulnerability due to the way memory addresses are handled, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0745 and CVE-2018-0746.
Applies to:
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3886
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3886
CVE-2018-0745
Severity:
Low
Description:
The Windows kernel in Windows 10 version 1703. Windows 10 version 1709, and Windows Server, version 1709 allows an information disclosure vulnerability due to the way objects are handled in memory, aka "Windows Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0746 and CVE-2018-0747.
Applies to:
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3882
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3882
CVE-2018-0744
Severity:
Medium
Description:
The Windows kernel in Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way objects are handled in memory, aka "Windows Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3885
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3885
CVE-2018-0748
Severity:
Medium
Description:
The Windows kernel in Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows an elevation of privilege vulnerability due to the way memory addresses are handled, aka "Windows Elevation of Privilege Vulnerability".
Applies to:
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3860
Title:
Scripting Engine Security Feature Bypass
Type:
Software
Bulletins:
CISEC:3860
CVE-2018-0818
Severity:
High
Description:
Microsoft ChakraCore allows an attacker to bypass Control Flow Guard (CFG) in conjunction with another vulnerability to run arbitrary code on a target system, due to how the Chakra scripting engine handles accessing memory, aka "Scripting Engine Security Feature Bypass".
Applies to:
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3853
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3853
CVE-2018-0773
Severity:
High
Description:
Microsoft Edge in Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3855
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3855
CVE-2018-0781
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, and CVE-2018-0778.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3856
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3856
CVE-2018-0776
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3857
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3857
CVE-2018-0778
Severity:
High
Description:
Microsoft Edge in Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3858
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3858
CVE-2018-0777
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3859
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3859
CVE-2018-0772
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3862
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3862
CVE-2018-0769
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3863
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3863
CVE-2018-0758
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3864
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3864
CVE-2018-0770
Severity:
High
Description:
Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3865
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3865
CVE-2018-0774
Severity:
High
Description:
Microsoft Edge in Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3866
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3866
CVE-2018-0768
Severity:
High
Description:
Microsoft Edge in Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3867
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3867
CVE-2018-0775
Severity:
High
Description:
Microsoft Edge in Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0762, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3869
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3869
CVE-2018-0762
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2018-0758, CVE-2018-0768, CVE-2018-0769, CVE-2018-0770, CVE-2018-0772, CVE-2018-0773, CVE-2018-0774, CVE-2018-0775, CVE-2018-0776, CVE-2018-0777, CVE-2018-0778, and CVE-2018-0781.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3870
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3870
CVE-2018-0780
Severity:
Low
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0767 and CVE-2018-0800.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3854
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3854
CVE-2018-0767
Severity:
Low
Description:
Microsoft Edge in Microsoft Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2018-0780 and CVE-2018-0800.
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3887
Title:
Microsoft Word Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3887
CVE-2018-0794
Severity:
High
Description:
Microsoft Word in Microsoft Office 2007, Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0792.
Applies to:
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3888
Title:
Microsoft Word Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3888
CVE-2018-0792
Severity:
High
Description:
Microsoft Word 2016 in Microsoft Office 2016 allows a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Word Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0794.
Applies to:
Microsoft Office 2016
Microsoft Office Online Server 2016
Microsoft Sharepoint Enterprise Server 2016
Microsoft Word 2016
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3850
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3850
CVE-2018-0789
Severity:
High
Description:
Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2013 and Microsoft SharePoint Server 2016 allow an elevation of privilege vulnerability due to the way web requests are handled, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0790.
Applies to:
Microsoft SharePoint Server 2010
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3849
Title:
Microsoft SharePoint Cross Site Scripting Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3849
CVE-2018-0790
Severity:
Medium
Description:
Microsoft SharePoint Foundation 2010, Microsoft SharePoint Server 2013 and Microsoft SharePoint Server 2016 allow an elevation of privilege vulnerability due to the way web requests are handled, aka "Microsoft SharePoint Elevation of Privilege Vulnerability". This CVE is unique from CVE-2018-0789.
Applies to:
Microsoft SharePoint Foundation 2010
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3851
Title:
Microsoft Outlook Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3851
CVE-2018-0793
Severity:
High
Description:
Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, and Microsoft Outlook 2016 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0793.
Applies to:
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office Compatibility Pack
Microsoft Word 2007
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3852
Title:
Microsoft Outlook Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3852
CVE-2018-0791
Severity:
High
Description:
Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, and Microsoft Outlook 2016 allow a remote code execution vulnerability due to the way email messages are parsed, aka "Microsoft Outlook Remote Code Execution Vulnerability". This CVE is unique from CVE-2018-0793.
Applies to:
Microsoft Office 2016
Microsoft Outlook 2007
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3861
Title:
Microsoft Edge Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3861
CVE-2018-0766
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how the Microsoft Edge PDF Reader handles objects in memory, aka "Microsoft Edge Information Disclosure Vulnerability".
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3868
Title:
Microsoft Edge Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3868
CVE-2018-0803
Severity:
Medium
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to access information from one domain and inject it into another domain, due to how Microsoft Edge enforces cross-domain policies, aka "Microsoft Edge Elevation of Privilege Vulnerability".
Applies to:
Microsoft Edge
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3871
Title:
Microsoft Color Management Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3871
CVE-2018-0741
Severity:
Low
Description:
The Color Management Module (Icm32.dll) in Windows 7 SP1 and Windows Server 2008 SP2 and R2 SP1 allows an information disclosure vulnerability due to the way objects are handled in memory, aka "Microsoft Color Management Information Disclosure Vulnerability".
Applies to:
Created:
2018-02-09
Updated:
2024-01-17

ID:
CISEC:3833
Title:
Cumulative Security Update for Internet Explorer
Type:
Web
Bulletins:
CISEC:3833
CVE-2015-2444
Severity:
High
Description:
Microsoft Internet Explorer 8 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Memory Corruption Vulnerability," a different vulnerability than CVE-2015-2442.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 7
Microsoft Internet Explorer 8
Microsoft Internet Explorer 9
Created:
2018-02-02
Updated:
2024-01-17

ID:
CISEC:3808
Title:
Windows RRAS Service Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3808
CVE-2017-11885
Severity:
High
Description:
Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow a remote code execution vulnerability due to the way the Routing and Remote Access service handles requests, aka "Windows RRAS Service Remote Code Execution Vulnerability".
Applies to:
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3811
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3811
CVE-2017-11901
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3812
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3812
CVE-2017-11890
Severity:
High
Description:
Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3813
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3813
CVE-2017-11907
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3814
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3814
CVE-2017-11905
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3816
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3816
CVE-2017-11889
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3818
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3818
CVE-2017-11895
Severity:
High
Description:
ChakraCore, and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3819
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3819
CVE-2017-11893
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3820
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3820
CVE-2017-11903
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3821
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3821
CVE-2017-11886
Severity:
High
Description:
Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allow an attacker to execute arbitrary code in the context of the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3815
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3815
CVE-2017-11887
Severity:
Low
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how Internet Explorer handle objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11906 and CVE-2017-11919.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3817
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3817
CVE-2017-11906
Severity:
Low
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11887 and CVE-2017-11919.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3807
Title:
Microsoft SharePoint Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:3807
CVE-2017-11936
Severity:
Medium
Description:
Microsoft SharePoint Enterprise Server 2016 allows an elevation of privilege vulnerability due to the way web requests are handled, aka "Microsoft SharePoint Elevation of Privilege Vulnerability".
Applies to:
Microsoft Sharepoint Server 2016
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3822
Title:
Microsoft PowerPoint Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3822
CVE-2017-11934
Severity:
Medium
Description:
Microsoft Office 2013 RT SP1, Microsoft Office 2013 SP1, and Microsoft Office 2016 allow an information disclosure vulnerability due to the way certain functions handle objects in memory, aka "Microsoft Office Information Disclosure Vulnerability".
Applies to:
Microsoft Office 2013
Microsoft Office 2016
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3806
Title:
Microsoft Office Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3806
CVE-2017-11939
Severity:
Medium
Description:
Microsoft Office 2016 Click-to-Run (C2R) allows an information disclosure vulnerability due to the way Microsoft Office enforces DRM copy/paste permissions, aka "Microsoft Office Information Disclosure Vulnerability".
Applies to:
Microsoft Office 2016
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3810
Title:
Microsoft Exchange Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:3810
CVE-2017-11932
Severity:
Medium
Description:
Microsoft Exchange Server 2016 CU5 and Microsoft Exchange Server 2016 CU5 allow a spoofing vulnerability due to the way Outlook Web Access (OWA) validates web requests, aka "Microsoft Exchange Spoofing Vulnerability".
Applies to:
Microsoft Exchange 2016
Created:
2018-01-26
Updated:
2024-01-17

ID:
CISEC:3789
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3789
CVE-2017-11909
Severity:
High
Description:
ChakraCore and Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3790
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3790
CVE-2017-11913
Severity:
High
Description:
Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how Internet Explorer handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3791
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3791
CVE-2017-11908
Severity:
High
Description:
ChakraCore and Windows 10 1709 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3792
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3792
CVE-2017-11914
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3794
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3794
CVE-2017-11918
Severity:
High
Description:
ChakraCore and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, and CVE-2017-11930.
Applies to:
Microsoft Edge
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3795
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3795
CVE-2017-11916
Severity:
High
Description:
ChakraCore allows an attacker to execute arbitrary code in the context of the current user, due to how the ChakraCore scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3796
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3796
CVE-2017-11912
Severity:
High
Description:
ChakraCore, and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and Internet Explorer and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3797
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3797
CVE-2017-11910
Severity:
High
Description:
ChakraCore and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3798
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3798
CVE-2017-11930
Severity:
High
Description:
ChakraCore, and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, and CVE-2017-11916.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3799
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3799
CVE-2017-11911
Severity:
High
Description:
ChakraCore and Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11894, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3793
Title:
Scripting Engine Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3793
CVE-2017-11919
Severity:
Low
Description:
ChakraCore, and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 R2, and Windows 10 Gold, 1511, 1607, 1703, 1709, Windows Server 2016, and Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to obtain information to further compromise the user's system, due to how the scripting engine handles objects in memory, aka "Scripting Engine Information Disclosure Vulnerability". This CVE ID is unique from CVE-2017-11887 and CVE-2017-11906.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 11
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3802
Title:
Microsoft Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:3802
CVE-2017-11899
Severity:
High
Description:
Device Guard in Windows 10 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allows a security feature bypass vulnerability due to the way untrusted files are handled, aka "Microsoft Windows Security Feature Bypass Vulnerability".
Applies to:
Microsoft Edge
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3801
Title:
Microsoft Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:3801
CVE-2017-11927
Severity:
Medium
Description:
Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703 and 1709, Windows Server 2016 and Windows Server, version 1709 allow an information vulnerability due to the way the Windows its:// protocol handler determines the zone of a request, aka "Microsoft Windows Information Disclosure Vulnerability".
Applies to:
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3803
Title:
Microsoft Malware Protection Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3803
CVE-2017-11937
Severity:
High
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, 1709 and Windows Server 2016, Windows Server, version 1709, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to remote code execution. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability".
Applies to:
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3804
Title:
Microsoft Malware Protection Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3804
CVE-2017-11940
Severity:
High
Description:
The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, 1709 and Windows Server 2016, Windows Server, version 1709, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to remote code execution. aka "Microsoft Malware Protection Engine Remote Code Execution Vulnerability". This is different than CVE-2017-11937.
Applies to:
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3805
Title:
Microsoft Excel Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:3805
CVE-2017-11935
Severity:
High
Description:
Microsoft Office 2016 Click-to-Run (C2R) allows a remote code execution vulnerability due to the way files are handled in memory, aka "Microsoft Excel Remote Code Execution Vulnerability".
Applies to:
Microsoft Office 2016
Created:
2018-01-19
Updated:
2024-01-17

ID:
CISEC:3800
Title:
Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3800
CVE-2017-11888
Severity:
High
Description:
Microsoft Edge in Microsoft Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to execute arbitrary code in the context of the current user, due to how Microsoft Edge handles objects in memory, aka "Microsoft Edge Memory Corruption Vulnerability".
Applies to:
Microsoft Edge
Created:
2018-01-19
Updated:
2024-01-17

ID:
CVE-2014-7952
Title:
The backup mechanism in the adb tool in Android might allow attackers to inject additional applications (APKs) and execute arbitrary code by leveraging failure to filter application data streams.
Type:
Mobile Devices
Bulletins:
CVE-2014-7952
SFBID75705
Severity:
Medium
Description:
The backup mechanism in the adb tool in Android might allow attackers to inject additional applications (APKs) and execute arbitrary code by leveraging failure to filter application data streams.
Applies to:
Created:
2018-01-12
Updated:
2024-01-17

ID:
CISEC:3772
Title:
Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:3772
CVE-2017-11894
Severity:
High
Description:
ChakraCore, and Internet Explorer in Microsoft Windows 7 SP1, Windows Server 2008 and R2 SP1, Windows 8.1 and Windows RT 8.1, Windows Server 2012 and R2, and and Internet Explorer adn Microsoft Edge in Windows 10 Gold, 1511, 1607, 1703, 1709, and Windows Server 2016 allows an attacker to gain the same user rights as the current user, due to how the scripting engine handles objects in memory, aka "Scripting Engine Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-11886, CVE-2017-11889, CVE-2017-11890, CVE-2017-11893, CVE-2017-11895, CVE-2017-11901, CVE-2017-11903, CVE-2017-11905, CVE-2017-11907, CVE-2017-11908, CVE-2017-11909, CVE-2017-11910, CVE-2017-11911, CVE-2017-11912, CVE-2017-11913, CVE-2017-11914, CVE-2017-11916, CVE-2017-11918, and CVE-2017-11930.
Applies to:
Microsoft Edge
Microsoft Internet Explorer 10
Microsoft Internet Explorer 11
Microsoft Internet Explorer 9
Created:
2018-01-12
Updated:
2024-01-17

ID:
CISEC:3734
Title:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3734
CVE-2017-16372
Severity:
High
Description:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3736
Title:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3736
CVE-2017-16373
Severity:
High
Description:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3742
Title:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3742
CVE-2017-16371
Severity:
High
Description:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3738
Title:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3738
CVE-2017-16375
Severity:
High
Description:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3739
Title:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3739
CVE-2017-16411
Severity:
High
Description:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3740
Title:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3740
CVE-2017-16364
Severity:
High
Description:
Untrusted pointer dereference vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3733
Title:
Security bypass vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3733
CVE-2017-16366
Severity:
Medium
Description:
Security bypass vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3743
Title:
Security bypass vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3743
CVE-2017-16361
Severity:
Medium
Description:
Security bypass vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3735
Title:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3735
CVE-2017-16407
Severity:
High
Description:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3737
Title:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3737
CVE-2017-16413
Severity:
High
Description:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3744
Title:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3744
CVE-2017-16416
Severity:
High
Description:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3741
Title:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier
Type:
Software
Bulletins:
CISEC:3741
CVE-2017-16415
Severity:
High
Description:
Out-of-bounds write vulnerability in Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat Reader 2017
Adobe Acrobat Reader DC Classic
Adobe Acrobat Reader DC Continuous
Adobe Acrobat Reader XI
Adobe Acrobat XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3762
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has an improper validation of array index vulnerability
Type:
Software
Bulletins:
CISEC:3762
CVE-2017-16391
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has an improper validation of array index vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3766
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has an improper validation of array index vulnerability
Type:
Software
Bulletins:
CISEC:3766
CVE-2017-16410
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has an improper validation of array index vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3758
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has an access of uninitialized pointer vulnerability
Type:
Software
Bulletins:
CISEC:3758
CVE-2017-16377
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has an access of uninitialized pointer vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3759
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has an access of uninitialized pointer vulnerability
Type:
Software
Bulletins:
CISEC:3759
CVE-2017-16378
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has an access of uninitialized pointer vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3746
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability
Type:
Software
Bulletins:
CISEC:3746
CVE-2017-16398
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3747
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability
Type:
Software
Bulletins:
CISEC:3747
CVE-2017-16388
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3750
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability
Type:
Software
Bulletins:
CISEC:3750
CVE-2017-16360
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3752
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability
Type:
Software
Bulletins:
CISEC:3752
CVE-2017-16389
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3753
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability
Type:
Software
Bulletins:
CISEC:3753
CVE-2017-16390
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3755
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability
Type:
Software
Bulletins:
CISEC:3755
CVE-2017-16393
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a use after free vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3763
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a heap overflow vulnerability
Type:
Software
Bulletins:
CISEC:3763
CVE-2017-16383
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a heap overflow vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3764
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer overflow/underflow vulnerability
Type:
Software
Bulletins:
CISEC:3764
CVE-2017-16368
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer overflow/underflow vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3751
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability
Type:
Software
Bulletins:
CISEC:3751
CVE-2017-16363
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3760
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability
Type:
Software
Bulletins:
CISEC:3760
CVE-2017-16384
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3761
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability
Type:
Software
Bulletins:
CISEC:3761
CVE-2017-16374
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3756
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability
Type:
Software
Bulletins:
CISEC:3756
CVE-2017-16365
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3765
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability
Type:
Software
Bulletins:
CISEC:3765
CVE-2017-16387
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3767
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability
Type:
Software
Bulletins:
CISEC:3767
CVE-2017-16386
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer over-read vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3745
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability
Type:
Software
Bulletins:
CISEC:3745
CVE-2017-16392
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3748
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability
Type:
Software
Bulletins:
CISEC:3748
CVE-2017-16381
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3749
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability
Type:
Software
Bulletins:
CISEC:3749
CVE-2017-16395
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3754
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability
Type:
Software
Bulletins:
CISEC:3754
CVE-2017-16385
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17

ID:
CISEC:3757
Title:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability
Type:
Software
Bulletins:
CISEC:3757
CVE-2017-16396
Severity:
High
Description:
Adobe Acrobat Reader 2017.012.20098 and earlier, 2017.011.30066 and earlier, 2015.006.30355 and earlier, and 11.0.22 and earlier has a buffer access with incorrect length value vulnerability. Successful exploitation could lead to remote code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Acrobat XI
Adobe Reader
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Adobe Reader XI
Created:
2018-01-05
Updated:
2024-01-17