Thursday, December 5, 2024
HomeSecurity UpdatesMicrosoft Released Security Updates for July and Fixed 53 Security Vulnerabilities

Microsoft Released Security Updates for July and Fixed 53 Security Vulnerabilities

Published on

SIEM as a Service

Microsoft Security Updates released for July 2018 under Patch Tuesday with fixes of 53 security vulnerabilities for 15 different Microsoft Product.

Microsoft releases Windows 10 builds 17134.165, 16299.547 with fixes of Windows 10 vulnerabilities and you can manually download it here.

This July Microsoft Security Updates including many of the Microsoft software product that listed below.

- Advertisement - SIEM as a Service

The July security release consists of security updates for the following software:

  • Internet Explorer
  • Microsoft Edge
  • Microsoft Windows
  • Microsoft Office and Microsoft Office Services and Web Apps
  • ChakraCore
  • Adobe Flash Player
  • .NET Framework
  • ASP.NET
  • Microsoft Research JavaScript Cryptography Library
  • Skype for Business and Microsoft Lync
  • Visual Studio
  • Microsoft Wireless Display Adapter V2 Software
  • PowerShell Editor Services
  • PowerShell Extension for Visual Studio Code
  • Web Customizations for Active Directory Federation Service

Fixed vulnerabilities belong to various categories such as Remote Code Injection, Elevation of Privilege, Security Feature Bypass, Memory Corruption  Denial of Service etc.

In this Microsoft Security Updates provided a complete guide list for this July updates with affected prooduct and vulnerabilities details

Microsoft Security Updates

Microsoft Scripting Engine

Microsoft Scripting EngineCVE-2018-8294Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8280Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8242Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8125Microsoft Edge Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8298Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8287Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8288Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8290Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8279Microsoft Edge Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8283Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8286Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8275Microsoft Edge Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8296Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8291Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8276Scripting Engine Security Feature Bypass Vulnerability

Microsoft Office

Microsoft OfficeCVE-2018-8281Microsoft Office Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8323Microsoft SharePoint Elevation of Privilege Vulnerability
Microsoft OfficeCVE-2018-8300Microsoft SharePoint Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8312Microsoft Access Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8299Microsoft SharePoint Elevation of Privilege Vulnerability
Microsoft OfficeCVE-2018-8310Microsoft Office Tampering Vulnerability

Microsoft Windows

Microsoft WindowsCVE-2018-8308Windows Kernel Elevation of Privilege Vulnerability
Microsoft WindowsCVE-2018-8309Windows Denial of Service Vulnerability
Microsoft WindowsCVE-2018-8305Windows Mail Client Information Disclosure Vulnerability
Microsoft WindowsCVE-2018-8206Windows FTP Server Denial of Service Vulnerability
Microsoft WindowsCVE-2018-8319MSR JavaScript Cryptography Library Security Feature Bypass Vulnerability
Microsoft WindowsCVE-2018-8313Windows Elevation of Privilege Vulnerability

Microsoft Edge

Microsoft EdgeCVE-2018-8289Microsoft Edge Information Disclosure Vulnerability
Microsoft EdgeCVE-2018-8301Microsoft Edge Memory Corruption Vulnerability
Microsoft EdgeCVE-2018-8325Microsoft Edge Information Disclosure Vulnerability
Microsoft EdgeCVE-2018-8324Microsoft Edge Information Disclosure Vulnerability
Microsoft EdgeCVE-2018-8297Microsoft Edge Information Disclosure Vulnerability
Microsoft EdgeCVE-2018-8274Microsoft Edge Memory Corruption Vulnerability
Microsoft EdgeCVE-2018-8278Microsoft Edge Spoofing Vulnerability
Microsoft EdgeCVE-2018-8262Microsoft Edge Memory Corruption Vulnerability

.NET Framework

.NET FrameworkCVE-2018-8284.NET Framework Remote Code Injection Vulnerability
.NET FrameworkCVE-2018-8260.NET Framework Remote Code Execution Vulnerability
.NET FrameworkCVE-2018-8202.NET Framework Elevation of Privilege Vulnerability
.NET FrameworkCVE-2018-8356.NET Framework Security Feature Bypass Vulnerability

Other Products

Visual StudioCVE-2018-8172Visual Studio Remote Code Execution Vulnerability
Visual StudioCVE-2018-8232Microsoft Macro Assembler Tampering Vulnerability
Windows KernelCVE-2018-8282Win32k Elevation of Privilege Vulnerability
Windows ShellCVE-2018-8314Windows Elevation of Privilege Vulnerability
Microsoft Windows DNSCVE-2018-8304Windows DNSAPI Denial of Service Vulnerability
Microsoft WordPadCVE-2018-8307WordPad Security Feature Bypass Vulnerability
Skype for Business and   Microsoft LyncCVE-2018-8238Skype for Business and Lync Security Feature Bypass Vulnerability
Skype for Business and  Microsoft LyncCVE-2018-8311Remote Code Execution Vulnerability in Skype For Business and Lync
Microsoft               PowerShellCVE-2018-8327PowerShell Editor Services Remote Code Execution Vulnerability
Active DirectoryCVE-2018-8326Open Source Customization for Active Directory Federation Services XSS Vulnerability
ASP.NETCVE-2018-8171ASP.NET Security Feature Bypass Vulnerability
Device GuardCVE-2018-8222Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Internet ExplorerCVE-2018-0949Internet Explorer Security Feature Bypass Vulnerability
Microsoft DevicesCVE-2018-8306Microsoft Wireless Display Adapter Command Injection Vulnerability

Also Read: 

Debian Released Security Updates for July and Fixed Multiple Package Vulnerabilities

Apple Released Security Updates for iOS, macOS, Safari, iTunes – iOS 11.4.1 Released

Google Released Security Updates for More than 40 Android Security vulnerabilities

WordPress Update 4.9.7 – Critical Security Update to Resolve Bugs and Security Issues

VMware Released Security Updates for Critical Remote Code Execution Vulnerability

Microsoft Released Critical Security Updates with Patch for 50 Critical Vulnerabilities

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

ChatGPT Next Web Vulnerability Let Attackers Exploit Endpoint to Perform SSRF

Researchers released a detailed report on a significant security vulnerability named CVE-2023-49785, affecting the...

Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification

A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially...

Deloitte UK Hacked – Brain Cipher Group Claim to Have Stolen 1 TB of Data

Brain Cipher has claimed to have breached Deloitte UK and exfiltrated over 1 terabyte...

Cloudflare Developer Domains Abused For Cyber Attacks

Cloudflare Pages, a popular web deployment platform, is exploited by threat actors to host...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

ChatGPT Next Web Vulnerability Let Attackers Exploit Endpoint to Perform SSRF

Researchers released a detailed report on a significant security vulnerability named CVE-2023-49785, affecting the...

Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification

A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially...

Google Chrome Security Update, Patch for High-severity Vulnerability

Google has released a significant security update for its Chrome browser, aiming to address...