Windows kernel vulnerability in multiple Microsoft Windows versions allows information disclosure due to memory address handling
Reporter | Title | Published | Views | Family All 117 |
---|---|---|---|---|
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
![]() | Information disclosure | 14 Mar 201817:29 | â | prion |
[
{
"product": "Windows kernel",
"vendor": "Microsoft Corporation",
"versions": [
{
"status": "affected",
"version": "Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1 and RT 8.1, Windows Server 2012 and R2, Windows 10 Gold, 1511, 1607, 1703, and 1709, Windows Server 2016 and Windows Server, version 1709"
}
]
}
]
Source | Link |
---|---|
portal | www.portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0926 |
securitytracker | www.securitytracker.com/id/1040517 |
securityfocus | www.securityfocus.com/bid/103247 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo