Beschreibung
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
- A remote code execution vulnerability in Windows VBScript Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Browsers can be exploited remotely via specially crafted website to bypass security restrictions.
- A security feature bypass vulnerability in Internet Explorer can be exploited remotely via specially crafted to bypass security restrictions.
- A security feature bypass vulnerability in Internet Explorer can be exploited remotely via specially crafted content to bypass security restrictions.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to gain privileges.
- An elevation of privilege vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to execute arbitrary code.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to obtain sensitive information.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely to bypass security restrictions.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to obtain sensitive information.
Ursprüngliche Informationshinweise
- CVE-2019-0763
- CVE-2019-0783
- CVE-2019-0780
- CVE-2019-0667
- CVE-2019-0762
- CVE-2019-0761
- CVE-2019-0769
- CVE-2019-0768
- CVE-2019-0592
- CVE-2019-0680
- CVE-2019-0770
- CVE-2019-0678
- CVE-2019-0771
- CVE-2019-0779
- CVE-2019-0746
- CVE-2019-0666
- CVE-2019-0639
- CVE-2019-0665
- CVE-2019-0612
- CVE-2019-0609
- CVE-2019-0611
CVE Liste
- CVE-2019-0773 critical
- CVE-2019-0763 critical
- CVE-2019-0783 critical
- CVE-2019-0780 critical
- CVE-2019-0667 critical
- CVE-2019-0762 critical
- CVE-2019-0761 critical
- CVE-2019-0769 critical
- CVE-2019-0768 critical
- CVE-2019-0592 critical
- CVE-2019-0680 critical
- CVE-2019-0770 critical
- CVE-2019-0678 critical
- CVE-2019-0771 critical
- CVE-2019-0779 critical
- CVE-2019-0746 critical
- CVE-2019-0666 critical
- CVE-2019-0639 critical
- CVE-2019-0665 critical
- CVE-2019-0612 critical
- CVE-2019-0609 critical
- CVE-2019-0611 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!