9.3
CVSSv2

CVE-2018-8420

Published: 13/09/2018 Updated: 19/11/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 829
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka "MS XML Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft windows server 2008

microsoft windows server 2012

microsoft windows 10 -

microsoft windows 10 1607

microsoft windows 10 1703

microsoft windows 10 1709

microsoft windows 7 -

microsoft windows 8.1 -

microsoft windows server 2016

microsoft windows 10 1803

Github Repositories

Exploits Drupalgeddon2 [CVE-2018-7600]: $ ruby -v ruby 251p57 (2018-03-29 revision 63029) [x86_64-linux-gnu] $ ruby drupalgeddon2rb examplecom $ ruby drupalgeddon2-not-write-shellrb <target> <version [7,8]> <command> [php_method] [form_path] ruby drupalgeddon2-not-write-shellrb 7

windows-pentesting-resources Windows Pentesting Resources  : Fun with LDAP, Kerberos (and MSRPC) in AD Environments speakerdeckcom/ropnop/fun-with-ldap-kerberos-and-msrpc-in-ad-environments From XML External Entity to NTLM Domain Hashes techblogmediaservicenet/2018/02/from-xml-external-entity-to-ntlm-domain-hashes/ Windows Privilege Escalation Guide