Wednesday, January 29, 2025
HomeExploitMicrosoft Released Security Updates & Fixed 39 Vulnerabilities Including Active Zero-day

Microsoft Released Security Updates & Fixed 39 Vulnerabilities Including Active Zero-day

Published on

SIEM as a Service

Follow Us on Google News

Microsoft released security updates under December Patch Tuesday and fixed several vulnerabilities that affected various Microsoft products.

There are 39 vulnerabilities were addressed including the active zero-day vulnerability that could exploit using malware and attackers execute the code in the kernel.

Following Microsoft products are patched in this December security release along with some of the critical security vulnerabilities.

  • Adobe Flash Player
  • Internet Explorer
  • Microsoft Edge
  • Microsoft Windows
  • Microsoft Office and Microsoft Office Services and Web Apps
  • ChakraCore
  • .NET Framework
  • Microsoft Dynamics NAV
  • Microsoft Exchange Server
  • Microsoft Visual Studio
  • Windows Azure Pack (WAP)

In this case, Microsoft marked 9 vulnerabilities as “critical,” that allow very serious impact and a remote attacker could take over the vulnerable applications and 30 flaws rated as “important”.

CVE-2018-8517, A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the .NET Framework application,” . “The vulnerability can be exploited remotely, without authentication.”

Rapid7 reported  Internet Explorer (CVE-2018-8631) and Edge (CVE-2018-8624) which considered by Microsoft that most likely to be exploited.

Microsoft Security Updates

Microsoft Office
Microsoft OfficeCVE-2018-8628Microsoft PowerPoint Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8636Microsoft Excel Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8627Microsoft Excel Information Disclosure Vulnerability
Microsoft OfficeCVE-2018-8598Microsoft Excel Information Disclosure Vulnerability
Microsoft OfficeCVE-2018-8587Microsoft Outlook Remote Code Execution Vulnerability
Microsoft OfficeCVE-2018-8597Microsoft Excel Remote Code Execution Vulnerability
Microsoft Scripting Engine
Microsoft Scripting EngineCVE-2018-8629Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8643Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8625Windows VBScript Engine Remote Code Execution Vulnerability
Microsoft Scripting EngineCVE-2018-8617Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8583Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8618Chakra Scripting Engine Memory Corruption Vulnerability
Microsoft Scripting EngineCVE-2018-8624Chakra Scripting Engine Memory Corruption Vulnerability
Windows Kernel
Windows KernelCVE-2018-8477Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8621Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8612Connected User Experiences and Telemetry Service Denial of Service Vulnerability
Windows KernelCVE-2018-8611Windows Kernel Elevation of Privilege Vulnerability
Windows KernelCVE-2018-8622Windows Kernel Information Disclosure Vulnerability
Windows KernelCVE-2018-8637Win32k Information Disclosure Vulnerability
Microsoft Office SharePoint
Microsoft Office SharePointCVE-2018-8635Microsoft SharePoint Server Elevation of Privilege Vulnerability
Microsoft Office SharePointCVE-2018-8580Microsoft SharePoint Information Disclosure Vulnerability
Microsoft Windows DNS
Microsoft Windows DNSCVE-2018-8514Remote Procedure Call runtime Information Disclosure Vulnerability
Microsoft Windows DNSCVE-2018-8626Windows DNS Server Heap Overflow Vulnerability
NET Framework
.NET FrameworkCVE-2018-8517.NET Framework Denial Of Service Vulnerability
.NET FrameworkCVE-2018-8540.NET Framework Remote Code Injection Vulnerability

Adobe Flash Player

Adobe Flash PlayerADV180031December 2018 Adobe Flash Security Update

Other Vulnerabilities

Microsoft DynamicsCVE-2018-8651Microsoft Dynamics NAV Cross Site Scripting Vulnerability
Microsoft Exchange ServerCVE-2018-8604Microsoft Exchange Server Tampering Vulnerability
Visual StudioCVE-2018-8599Diagnostics Hub Standard Collector Service Elevation of Privilege Vulnerability
Windows Authentication MethodsCVE-2018-8634Microsoft Text-To-Speech Remote Code Execution Vulnerability
Windows Azure PackCVE-2018-8652Windows Azure Pack Cross Site Scripting Vulnerability
Windows Kernel-Mode DriversCVE-2018-8641Win32k Elevation of Privilege Vulnerability
Internet ExplorerCVE-2018-8619Internet Explorer Remote Code Execution Vulnerability
Internet ExplorerCVE-2018-8631Internet Explorer Memory Corruption Vulnerability
Microsoft DynamicsCVE-2018-8651Microsoft Dynamics NAV Cross Site Scripting Vulnerability
Microsoft Exchange ServerCVE-2018-8604Microsoft Exchange Server Tampering Vulnerability

Also Read:

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts

A recent security vulnerability in a widely used airline integration service has exposed millions...

Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities

In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system,...

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been...

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical SUSE Linux Distro Injection Vulnerability Allow Attackers Exploits “go-git” Library

A significant security vulnerability, designated CVE-2025-21613, has been discovered in the go-git library, used...

CISA Released A Free Guide to Enhance OT Product Security

To address rising cyber threats targeting critical infrastructure, the U.S. Cybersecurity and Infrastructure Security...