{"uuid": "c61adbb8-e58b-4754-83ea-0fb8c0a65bd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-0986", "type": "seen", "source": "https://t.me/itsecalert/103", "content": "\u26a0\ufe0f Windows 10/8/7 +  Server 2008/2012/2016  - Microsoft Malware Protection Engine, Microsoft Windows Defender\nREMOTE CODE EXECUTION vulnerability.\n\nTo exploit this vulnerability, a specially crafted file must be scanned by an affected version of the Microsoft Malware Protection Engine. As these scanners are usually configured to scan all files written, incoming mail attachments can trigger the RCE without user interaction necessary.\nMicrosoft released an update which should be deployed by you immediately. \n\nAffects Versions below 1.1.14700.5 on all Windows Systems (begins with Windows 7 and Windows Server 2008).\n\nMore Information: https://yt.gl/dsk2q\n\n(severity: \ud83d\udd36 high) \n\n#alert #vulnerability #severityhigh #windows #CVE-2018-0986\nFeel free to discuss this issue in @itsectalk and do your colleagues a favor and forward them this critical vulnerability.\nFollow us &amp; share on LinkedIn: https://www.linkedin.com/feed/update/urn:li:activity:6387603734268121088", "creation_timestamp": "2018-04-05T12:17:36.000000Z"}