Friday, January 31, 2025
HomeSecurity NewsMicrosoft Released All Security Fixes for Vulnerabilities That Affect Windows 10

Microsoft Released All Security Fixes for Vulnerabilities That Affect Windows 10

Published on

SIEM as a Service

Follow Us on Google News

Microsoft Released security Patch Tuesday updates for all security fixes that affect Windows 10 and some non-security fixes also released.

There are 50 critical security fixes are reported in this  February patches for Explorer (IE), Microsoft Edge, ChakraCore, Microsoft Windows, and Microsoft Office.

In this release, out of 5o Vulnerability, 14 are listed as Critical, 34 are rated Important, and 2 are rated Moderate in severity. Eight of these CVEs came through the ZDI program. Also, Microsoft Additionally released Meltdown and Spectre Vulnerability patches.

Aso Read:  Apple Released a Critical Security Updates for iOS 11.2.1

Adobe Patches for February 2018

Apart from Microsoft Released security Patch, Adobe released patches for Acrobat Reader and Experience Manager. The Reader update resolves 17 Critical and 24 Important severity bugs.

Some of Most Critical Microsoft Fixes:

CVE-2018-0852 – Microsoft Outlook Memory Corruption Vulnerability

This bug allows an attacker to get code execution through vulnerable versions of Microsoft Outlook.

CVE-2018-0850 – Microsoft Outlook Elevation of Privilege Vulnerability

This bug occurs when an attacker sends a maliciously crafted email to a victim. The email would need to be fashioned in a manner that forces Outlook to load a message store over SMB.

Outlook attempts to open the pre-configured message on receipt of the email. You read that right – not viewing, not previewing, but upon receipt. That means there’s a potential for an attacker to exploit this merely by sending an email.

CVE-2018-0771 – Microsoft Edge Security Feature Bypass Vulnerability

This bug could allow an attacker to bypass Same-Origin Policy (SOP) restrictions and allow requests that should otherwise be ignored.The result of such an attack would force the browser to disclose the sensitive information.

Here you can Find the Complete CVE for Microsoft Released security Patch

CVETitleSeverityPublicExploitedXI – LatestXI – Older
CVE-2018-0771Microsoft Edge Security Feature Bypass VulnerabilityModerateYesNo2N/A
CVE-2018-0763Microsoft Edge Information Disclosure VulnerabilityCriticalNoNo1N/A
CVE-2018-0825StructuredQuery Remote Code Execution VulnerabilityCriticalNoNo11
CVE-2018-0834Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0835Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0837Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0838Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0840Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0852Microsoft Outlook Memory Corruption VulnerabilityCriticalNoNo22
CVE-2018-0856Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0857Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0858Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0859Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0860Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0861Scripting Engine Memory Corruption VulnerabilityCriticalNoNo1N/A
CVE-2018-0742Windows Kernel Elevation of Privilege VulnerabilityImportantNoNo11
CVE-2018-0755Windows EOT Font Engine Information Disclosure VulnerabilityImportantNoNo22
CVE-2018-0756Windows Kernel Elevation of Privilege VulnerabilityImportantNoNo11
CVE-2018-0757Windows Kernel Information Disclosure VulnerabilityImportantNoNo22
CVE-2018-0760Windows EOT Font Engine Information Disclosure VulnerabilityImportantNoNo21
CVE-2018-0761Windows EOT Font Engine Information Disclosure VulnerabilityImportantNoNo21
CVE-2018-0809Windows Kernel Elevation of Privilege VulnerabilityImportantNoNo11
CVE-2018-0810Windows Kernel Information Disclosure VulnerabilityImportantNoNo22
CVE-2018-0820Windows Kernel Elevation of Privilege VulnerabilityImportantNoNo11
CVE-2018-0821Windows AppContainer Elevation Of Privilege VulnerabilityImportantNoNo11
CVE-2018-0822Windows NTFS Global Reparse Point Elevation of Privilege VulnerabilityImportantNoNo11
CVE-2018-0823Named Pipe File System Elevation of Privilege VulnerabilityImportantNoNo1N/A
CVE-2018-0826Windows Storage Services Elevation of Privilege VulnerabilityImportantNoNo11
CVE-2018-0827Windows Security Feature Bypass VulnerabilityImportantNoNo22
CVE-2018-0828Windows Elevation of Privilege VulnerabilityImportantNoNo22
CVE-2018-0829Windows Kernel Information Disclosure VulnerabilityImportantNoNo22
CVE-2018-0830Windows Kernel Information Disclosure VulnerabilityImportantNoNo22
CVE-2018-0831Windows Kernel Elevation of Privilege VulnerabilityImportantNoNo22
CVE-2018-0832Windows Information Disclosure VulnerabilityImportantNoNo22
CVE-2018-0836Scripting Engine Memory Corruption VulnerabilityImportantNoNo1N/A
CVE-2018-0839Microsoft Edge Information Disclosure VulnerabilityImportantNoNo1N/A
CVE-2018-0841Microsoft Office Remote Code Execution VulnerabilityImportantNoNo11
CVE-2018-0842Windows Remote Code Execution VulnerabilityImportantNoNo11
CVE-2018-0843Windows Kernel Information Disclosure VulnerabilityImportantNoNo2N/A
CVE-2018-0844Windows Common Log File System Driver Elevation Of Privilege VulnerabilityImportantNoNo11
CVE-2018-0846Windows Common Log File System Driver Elevation Of Privilege VulnerabilityImportantNoNo11
CVE-2018-0847Internet Explorer Information Disclosure VulnerabilityImportantNoNo11
CVE-2018-0850Microsoft Outlook Elevation of Privilege VulnerabilityImportantNoNo22
CVE-2018-0851Microsoft Office Memory Corruption VulnerabilityImportantNoNo11
CVE-2018-0853Microsoft Office Information Disclosure VulnerabilityImportantNoNo22
CVE-2018-0855Windows EOT Font Engine Information Disclosure VulnerabilityImportantNoNoN/A1
CVE-2018-0866Scripting Engine Memory Corruption VulnerabilityImportantNoNo11
CVE-2018-0864Microsoft SharePoint Elevation of Privilege VulnerabilityImportantNoNo3N/A
CVE-2018-0869Microsoft SharePoint Elevation of Privilege VulnerabilityImportantNoNo33
CVE-2018-0833Windows Denial of Service VulnerabilityModerateNoNoN/A
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Massive Hacking Forum Network Dismantled by Authorities, Impacting 10M Users

Authorities have delivered a major blow to the cybercrime world by dismantling two of...

Microsoft Enhances M365 Bounty Program with New Services & Rewards Up to $27,000

Microsoft has announced updates to its Microsoft 365 (M365) Bug Bounty Program, offering expanded...

Tata Technologies Hit by Ransomware Attack, Some IT Services Suspended

Tata Technologies, a leading provider of engineering and IT services, has reported a ransomware...

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

Microsoft Enhances Windows 11 Security with Admin Protection to Prevent Crowdstrike-Like Incident

Microsoft has introduced "Administrator Protection" (AP), a sophisticated security feature aimed at elevating Windows...

Russian APT28 Hackers Exploit Zero-Day Vulnerabilities to Target Government and Security Sectors

A detailed analysis from Maverits, a leading cybersecurity firm, reveals a significant evolution in...