Beschreibung
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A spoofing vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to spoof user interface.
- An information disclosure vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to obtain sensitive information.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely to obtain sensitive information.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Scripting Engine can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely to bypass security restrictions.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely via specially crafted content to obtain sensitive information.
- An information disclosure vulnerability in Internet Explorer can be exploited remotely to obtain sensitive information.
Ursprüngliche Informationshinweise
- CVE-2019-0654
- CVE-2019-0640
- CVE-2019-0610
- CVE-2019-0605
- CVE-2019-0607
- CVE-2019-0655
- CVE-2019-0643
- CVE-2019-0651
- CVE-2019-0648
- CVE-2019-0650
- CVE-2019-0649
- CVE-2019-0634
- CVE-2019-0641
- CVE-2019-0652
- CVE-2019-0590
- CVE-2019-0606
- CVE-2019-0591
- CVE-2019-0658
- CVE-2019-0645
- CVE-2019-0593
- CVE-2019-0642
- CVE-2019-0676
CVE Liste
- CVE-2019-0607 critical
- CVE-2019-0644 critical
- CVE-2019-0593 critical
- CVE-2019-0642 critical
- CVE-2019-0590 critical
- CVE-2019-0651 critical
- CVE-2019-0652 critical
- CVE-2019-0655 critical
- CVE-2019-0640 critical
- CVE-2019-0605 critical
- CVE-2019-0658 critical
- CVE-2019-0610 critical
- CVE-2019-0649 critical
- CVE-2019-0591 critical
- CVE-2019-0654 critical
- CVE-2019-0643 critical
- CVE-2019-0648 critical
- CVE-2019-0650 critical
- CVE-2019-0634 critical
- CVE-2019-0641 critical
- CVE-2019-0606 critical
- CVE-2019-0645 critical
- CVE-2019-0676 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!