Letou nhà cái đánh giá

Microsoft Office Click-to-Run ()

Microsoft Office Click-to-Run ()

Tag Archives: Vulristics.
But let’s start with the vulnerabilities that were presented on MS Patch Tuesday on August 11th.

There were 120 vulnerabilities: 17 of them are Critical and 103 Important

My could not find public exploits for these vulnerabilities on Vulners.com.
Internet Explorer ().
Windows ().
Windows spoofing () is good for phishing.
“In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded.” RCE in Internet Explorer () might be interesting in the context of “An attacker could also embed an ActiveX control marked “safe for initialization” in an application or Microsoft Office document that hosts the IE rendering engine”.
Internet Explorer ().
MSHTML Engine ().
Windows Ancillary Function Driver for WinSock ().
Windows GDI (, ).
Windows Kernel ().
Windows dnsrslvr.dll ().
Windows Kernel ().
For some reason, all VM vendors ignored Exploitation more likely vulnerabilities this time.

Although RCE in Internet Explorer () and MSHTML Engine () may be interesting

Memory Corruption (, , , , , ).
Information Disclosure ().
Remote Code Execution (, , , , ).
Information Disclosure ().
Information Disclosure ().
Cross Site Scripting (, ).
Spoofing (, , ).
Elevation of Privilege (, , , , , , , , , , , ).
NET Framework ().
Jet Database Engine (, , , ).
Microsoft Access ().
Microsoft Edge ().
Microsoft Edge PDF ().

Microsoft Graphics Components (

Microsoft Office ().
Microsoft Outlook ().

Microsoft Windows Codecs Library (

, ).
Scripting Engine ().
Visual Studio Code ().
Windows Font Driver Host ().
Windows Media ().
NET Core ().

Microsoft SQL Server Management Studio ()

Windows Remote Desktop Gateway (RD Gateway) ().
NET and.
NET ().
Connected User Experiences and Telemetry Service ().
DirectX ().
Local Security Authority Subsystem Service ().
Microsoft Office Click-to-Run ().
Netlogon ().
Windows ().
Windows Accounts Control ().
Windows AppX Deployment Extensions ().
Windows Backup Service ().
Windows CDP User Components (, ).
Windows CSC Service (, ).

Windows Custom Protocol Engine ()

Windows File Server Resource Management Service (

Windows Function Discovery SSDP Provider ().
Windows Hard Link ().
Windows Kernel (, ).
Windows Network Connection Broker ().
Windows Print Spooler ().
Windows Radio Manager API ().
Windows Registry (, ).
Windows Remote Access (, ).
Windows Runtime ().
Windows Server Resource Management Service ().
Windows Setup ().
Windows Speech Runtime (, ).
Windows Speech Shell Components ().
Windows Storage Service ().
Windows Telephony Server ().
Windows UPnP Device Host (, ).
Windows WalletService (, ).
Windows Work Folder Service ().
Windows Work Folders Service (, , ).
DirectWrite ().
Microsoft Outlook ().
Microsoft Word (, , ).
Windows ARM ().
Windows Image Acquisition Service (, ).
Windows Kernel ().
Windows RRAS Service ().
Windows State Repository Service ().
Windows WaasMedic Service ().

Microsoft Dynamics 365 (On-Premise) ()

If we look at the rest of the vulnerabilities.

The most interesting are RCEs in Jet Database Engine (, , , )

Microsoft Edge PDF (), Microsoft Windows Codecs Library (, , ) and Windows Media ().
The second block is Elevation of Privilege in Local Security Authority Subsystem Service (LSASS) (), Windows Print Spooler () and Netlogon ().
For the last one “an unauthenticated attacker could use MS-NRPC to connect to a domain controller as a domain administrator”.

Microsoft Dynamics 365 for Finance and Operations (on-premises) ()

Microsoft Edge (Chromium-based) ()

You may have heard about Microsoft unscheduled update to Windows Remote Access Elevation of Privilege released August 20.
But it was about the same vulnerabilities (, ) that were presented in August Patch Tuesday, but fixes this vulnerability for older OS versions: Windows 8.1, RT 8.1, and Server 2012 R2.
This entry was posted in , and tagged , , , , , , , , , , , on by.
I decided to release my Microsoft Patch Tuesday reporting tool as part of a larger open source project ().
I named it Vulristics (from “Vulnerability” and “Heuristics”).
I want this to be an extensible framework for analyzing publicly available information about vulnerabilities.
Let’s say we have a vulnerability ID (CVE ID) and we need to decide whether it is really critical or not.
We will probably go to some vulnerability databases (, , , etc.) and somehow analyze the descriptions and parameters.
Such analysis can be quite complex and not so obvious.
My idea is to formalize it and make it shareable.
It may not be the most efficient way to process data, but it should reflect real human experience, the things that real vulnerability analysts do.
This is the main goal.
This entry was posted in , , , and tagged , , , , , , on by.
Search for: Follow me in social networks: My Telegram Channel: My Youtube Channel: My Podcast RSS feed:.
This is my personal blog.
The opinions expressed here are my own and not of my employer.
All product names, logos, and brands are property of their respective owners.
All company, product and service names used here for identification purposes only.
Use of these names, logos, and brands does not imply endorsement.
You can freely use materials of this site, but it would be nice if you place a link on and send message about it at or contact me.