We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2018-1004



Description

A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka "Windows VBScript Engine Remote Code Execution Vulnerability." This affects Windows 7, Windows Server 2012 R2, Internet Explorer 9, Windows RT 8.1, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10.

Reserved 2017-12-01 | Published 2018-04-12 | Updated 2024-08-05 | Assigner microsoft

Problem types

Remote Code Execution

Product status

32-bit Systems Service Pack 1
affected

x64-based Systems Service Pack 1
affected

(Server Core installation)
affected

Windows Server 2008 for 32-bit Systems Service Pack 2
affected

Windows Server 2008 for x64-based Systems Service Pack 2
affected

Windows RT 8.1
affected

(Server Core installation)
affected

32-bit systems
affected

x64-based systems
affected

(Server Core installation)
affected

Itanium-Based Systems Service Pack 1
affected

x64-based Systems Service Pack 1
affected

x64-based Systems Service Pack 1 (Server Core installation)
affected

32-bit Systems
affected

Version 1511 for 32-bit Systems
affected

Version 1511 for x64-based Systems
affected

Version 1607 for 32-bit Systems
affected

Version 1607 for x64-based Systems
affected

Version 1703 for 32-bit Systems
affected

Version 1703 for x64-based Systems
affected

Version 1709 for 32-bit Systems
affected

Version 1709 for x64-based Systems
affected

x64-based Systems
affected

References

www.securitytracker.com/id/1040655 (1040655) vdb-entry

portal.msrc.microsoft.com/...guidance/advisory/CVE-2018-1004

www.securityfocus.com/bid/103657 (103657) vdb-entry

cve.org (CVE-2018-1004)

nvd.nist.gov (CVE-2018-1004)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2018-1004

Support options

Helpdesk Chat, Email, Knowledgebase
Subscribe to our newsletter to learn more about our work.