Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2018-0824

KEV EPSS 90.64% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2018-0824

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A remote code execution vulnerability exists in "Microsoft COM for Windows" when it fails to properly handle serialized objects, aka "Microsoft COM for Windows Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft COM for Windows 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft COM for Windows中存在远程代码执行漏洞,该漏洞源于程序没有正确的处理序列化对象。远程攻击者可利用该漏洞在受影响系统的上下文中执行任意代码或造成拒绝服务。以下系统版本受到影响:Microsoft Windows 10,Windows 10版本1607,Windows 10版本1703,Windows 10版本1709,Windows 10版本1803,Windows 7 SP1,Windows 8.1,Windows RT 8.1,Windows Server 2008 S
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2018-0824

#POC DescriptionSource LinkShenlong Link
1POC for CVE-2018-0824https://github.com/codewhitesec/UnmarshalPwnPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2018-0824

登录查看更多情报信息。

Same Patch Batch · n/a · 2018-05-09 · 19 CVEs total

CVE-2018-10940Linux kernel 安全漏洞
CVE-2018-6021Silex SD-320AN和GE MobileLink 安全漏洞
CVE-2018-6020Silex SD-320AN和GE MobileLink 安全漏洞
CVE-2018-8163Microsoft Excel 信息泄露漏洞
CVE-2018-8158Microsoft Office 缓冲区错误漏洞
CVE-2018-8130Microsoft ChakraCore和Edge 缓冲区错误漏洞
CVE-2018-0765Microsoft .NET Framework和.NET Core 安全漏洞
CVE-2018-10828Alps Pointing-device Driver 安全漏洞
CVE-2018-10770Anni 5 in 1 XVR 安全漏洞
CVE-2018-10705Aurora DAO 安全漏洞
CVE-2017-18265Prosody 安全漏洞
CVE-2018-10683Red Hat Wildfly 安全漏洞
CVE-2018-10682Red Hat Wildfly 安全漏洞
CVE-2018-108302345 Security Guard 安全漏洞
CVE-2018-10184HAProxy 安全漏洞
CVE-2018-10831Z-NOMP 安全漏洞
CVE-2018-10827LiteCart 安全漏洞
CVE-2018-10817Severalnines ClusterControl 跨站脚本漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2018-0824

No comments yet


Leave a comment