Beschreibung
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to obtain sensitive information, gain privileges, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Windows can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Storage Service can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in HID can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
- A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows DHCP Server can be exploited remotely via specially crafted packets to execute arbitrary code.
- A remote code execution vulnerability in Windows SMB can be exploited remotely via specially crafted packet to execute arbitrary code.
- A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in HID can be exploited remotely via specially crafted application to obtain sensitive information.
- A security feature bypass vulnerability in Windows Defender Firewall can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A security feature bypass vulnerability in Windows can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Windows SMB can be exploited remotely via specially crafted packet to execute arbitrary code.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2019-0623
- CVE-2019-0661
- CVE-2019-0599
- CVE-2019-0595
- CVE-2019-0664
- CVE-2019-0615
- CVE-2019-0659
- CVE-2019-0600
- CVE-2019-0619
- CVE-2019-0627
- CVE-2019-0631
- CVE-2019-0660
- CVE-2019-0616
- CVE-2019-0656
- CVE-2019-0626
- CVE-2019-0633
- CVE-2019-0618
- CVE-2019-0625
- CVE-2019-0628
- CVE-2019-0602
- CVE-2019-0601
- CVE-2019-0637
- CVE-2019-0621
- CVE-2019-0635
- CVE-2019-0597
- CVE-2019-0596
- CVE-2019-0632
- CVE-2019-0630
- CVE-2019-0598
- CVE-2019-0662
- ADV190006
- CVE-2019-0663
CVE Liste
- CVE-2019-0636 critical
- CVE-2019-0623 critical
- CVE-2019-0661 critical
- CVE-2019-0599 critical
- CVE-2019-0595 critical
- CVE-2019-0664 critical
- CVE-2019-0615 critical
- CVE-2019-0659 critical
- CVE-2019-0600 critical
- CVE-2019-0619 critical
- CVE-2019-0627 critical
- CVE-2019-0631 critical
- CVE-2019-0660 critical
- CVE-2019-0616 critical
- CVE-2019-0656 critical
- CVE-2019-0626 critical
- CVE-2019-0633 critical
- CVE-2019-0618 critical
- CVE-2019-0625 critical
- CVE-2019-0628 critical
- CVE-2019-0602 critical
- CVE-2019-0601 critical
- CVE-2019-0637 critical
- CVE-2019-0621 critical
- CVE-2019-0635 critical
- CVE-2019-0597 critical
- CVE-2019-0596 critical
- CVE-2019-0632 critical
- CVE-2019-0630 critical
- CVE-2019-0598 critical
- CVE-2019-0662 critical
- CVE-2019-0663 critical
KB Liste
- 4487020
- 4487017
- 4486996
- 4487026
- 4487025
- 4487044
- 4487018
- 4487028
- 4487000
- 4486993
- 4486563
- 4487023
- 4486564
- 4487019
- 4489881
- 4489891
- 4489878
- 4489885
- 4489883
- 4489886
- 4489899
- 4489880
- 4489871
- 4489868
- 4489876
- 4489872
- 4489884
- 4489882
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!