7.6
CVE-2018-8495
- EPSS 62.81%
- Veröffentlicht 10.10.2018 13:29:04
- Zuletzt bearbeitet 21.11.2024 04:13:57
- Quelle secure@microsoft.com
- CVE-Watchlists
- Unerledigt
A remote code execution vulnerability exists when Windows Shell improperly handles URIs, aka "Windows Shell Remote Code Execution Vulnerability." This affects Windows Server 2016, Windows 10, Windows 10 Servers.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Microsoft ≫ Windows 10 Version1607
Microsoft ≫ Windows 10 Version1703
Microsoft ≫ Windows 10 Version1709
Microsoft ≫ Windows 10 Version1803
Microsoft ≫ Windows Server 2016 Version-
Microsoft ≫ Windows Server 2016 Version1709
Microsoft ≫ Windows Server 2016 Version1803
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 62.81% | 0.983 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 7.5 | 1.6 | 5.9 |
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.6 | 4.9 | 10 |
AV:N/AC:H/Au:N/C:C/I:C/A:C
|
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.