CVE-2018-0802

Vulnerability updated 4 months ago (2024-05-04T16:54:12.500Z)
Download STIX
Preview STIX
Not enough context has been learned about CVE-2018-0802 for a description yet. However we're tracking it as a Vulnerability profile. Vulnerability: A flaw in software design or implementation
Description last updated:
What's your take? (Question 1 of 3)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Vulnerability
Tesla
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
Agent TeslaUnspecified
2
Agent Tesla is a type of malware, or malicious software, that exploits and damages computer systems. It can infiltrate your system through suspicious downloads, emails, or websites, often without the user's knowledge. Once inside, it can steal personal information, disrupt operations, or even hold d
Associated Vulnerabilities
To see the evidence that has resulted in these vulnerability associations, create a free account
IDTypeVotesProfile Description
CVE-2017-11882Unspecified
2
CVE-2017-11882 is a significant software vulnerability, specifically a flaw in the design or implementation of Microsoft's Equation Editor. This vulnerability has been exploited by various threat actors to create malicious RTF files, most notably by Chinese state-sponsored groups using the "Royal Ro
Source Document References
Information about the CVE-2018-0802 Vulnerability was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securelist
18 days ago
Analyzing the vulnerability landscape in Q2 2024
CERT-EU
6 months ago
Kaspersky spam and phishing report for 2023
Checkpoint
7 months ago
Maldocs ­of Word and Excel: Vigor of the Ages - Check Point Research
Checkpoint
7 months ago
12th February – Threat Intelligence Report - Check Point Research
Securelist
9 months ago
PC malware statistics, Q3 2023
CERT-EU
a year ago
Alert: Phishing Campaigns Deliver New SideTwist Backdoor and Agent Tesla Variant
CERT-EU
a year ago
New Agent Tesla Variant Uses Excel Exploit to Infect Windows PC
CERT-EU
a year ago
New Agent Tesla Variant Being Spread by Crafted Excel Document - Cyber Security Review
Fortinet
a year ago
New Agent Tesla Variant Being Spread by Crafted Excel Document | FortiGuard Labs
CERT-EU
a year ago
Qualys Top 20 Exploited Vulnerabilities | Qualys Security Blog
CERT-EU
a year ago
IT threat evolution in Q2 2023. Non-mobile statistics – GIXtools
CERT-EU
a year ago
PC malware statistics, Q2 2022
CERT-EU
a year ago
Press Release: Endpoint Malware and Ransomware Volume Exceeded 2020 Totals by End of Q3 2021
Securelist
a year ago
Non-mobile malware statistics, Q1 2023
MITRE
2 years ago
Tropic Trooper’s New Strategy
MITRE
2 years ago
Two Birds, One STONE PANDA
MITRE
2 years ago
Bitter APT adds Bangladesh to their targets
MITRE
2 years ago
Advanced Persistent Threats (APTs) | Threat Actors & Groups
MITRE
2 years ago
Ramsay: A cyber‑espionage toolkit tailored for air‑gapped networks | WeLiveSecurity
Checkpoint
2 years ago
Cloud Atlas targets entities in Russia and Belarus amid the ongoing war in Ukraine – Check Point Research