Input validation error in Microsoft products - CVE-2018-8256
Published: November 13, 2018
Windows
Windows Server
PowerShell Core
Detailed vulnerability description
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to insufficient validation of user-supplied input within PowerShell files. A remote attacker can create a specially crafted PowerShell file, trick the victim into opening it and execute arbitrary code on the target system with privileges of the current user.