7.2
CVSSv2

CVE-2018-8210

Published: 14/06/2018 Updated: 03/10/2019
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 643
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A remote code execution vulnerability exists when Windows improperly handles objects in memory, aka "Windows Remote Code Execution Vulnerability." This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2012, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2018-8213.

Vulnerability Trend

Affected Products

Github Repositories

CVE-2018-8120 CVE-2018-8120 Windows LPE exploit Supports both x32 and x64 Tested on: Win7 x32, Win7 x64, Win2008 x32, Win2008 R2 x32, Win2008 R2 Datacenter x64, Win2008 Enterprise x64 Usage CVE-2018-8120 exploit by @unamer(githubcom/unamer) Usage: expexe command Example: expexe "net user admin admin /ad" Caution Please exclude shellcodeasm if you wanna

PENTESTING-BIBLE hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources MORE THAN 1000 LINK MORE TO COME -1- 3 Ways Extract Password Hashes from NTDSdit: wwwhackingarticlesin/3-ways-extract-password-hashes-from-ntds-dit -2- 3 ways to Capture HTTP Password in Network PC: wwwh

PENTESTING-BIBLE hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources MORE THAN 1000 LINK MORE TO COME -1- 3 Ways Extract Password Hashes from NTDSdit: wwwhackingarticlesin/3-ways-extract-password-hashes-from-ntds-dit -2- 3 ways to Capture HTTP Password in Network PC: wwwh