Kaspersky ID:
KLA11557
Erkennungsdatum:
09/10/2019
Aktualisiert:
01/28/2026

Beschreibung

Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code;
  2. An information disclosure vulnerability in Microsoft Edge based on Edge HTML can be exploited remotely via specially crafted content to obtain sensitive information;
  3. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code;
  4. A security feature bypass vulnerability in Microsoft Browser can be exploited remotely via specially crafted to bypass security restrictions;
  5. A remote code execution vulnerability in VBScript can be exploited remotely via specially crafted website to execute arbitrary code.

Ursprüngliche Informationshinweise

Ausnutzung

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Betroffene Produkte

CVE Liste

  • CVE-2019-1138
    critical
  • CVE-2019-1298
    critical
  • CVE-2019-1237
    critical
  • CVE-2019-1300
    critical
  • CVE-2019-1217
    critical
  • CVE-2019-1299
    high
  • CVE-2019-1221
    critical
  • CVE-2019-1220
    warning
  • CVE-2019-1236
    critical
  • CVE-2019-1208
    critical

KB Liste

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.