Beschreibung
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Remote Desktop Protocol Client can be exploited remotely via specially crafted application to obtain sensitive information.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- Unspecified Windows Communication Foundation can be exploited remotely to gain privileges.
- A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Audio Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows RPCSS can be exploited remotely via specially crafted application to gain privileges.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows WLAN Service can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Remote Desktop Services can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in DirectWrite can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in Win32k can be exploited remotely via specially crafted application to obtain sensitive information.
Ursprüngliche Informationshinweise
- CVE-2019-1004
- CVE-2019-1099
- CVE-2019-1006
- CVE-2019-1101
- CVE-2019-1100
- CVE-2019-1102
- CVE-2019-1104
- CVE-2019-1088
- CVE-2019-1089
- CVE-2019-1063
- CVE-2019-1082
- CVE-2019-1085
- CVE-2019-0887
- CVE-2019-1132
- CVE-2019-1116
- CVE-2019-1071
- CVE-2019-1073
- CVE-2019-1098
- CVE-2019-1097
- CVE-2019-1096
- CVE-2019-1095
- CVE-2019-1094
- CVE-2019-1093
- CVE-2019-1059
Ausnutzung
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Betroffene Produkte
- Microsoft-Internet-Explorer
- Microsoft-.NET-Framework
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Edge
CVE Liste
- CVE-2019-1116 high
- CVE-2019-1101 high
- CVE-2019-1099 high
- CVE-2019-1093 high
- CVE-2019-1108 high
- CVE-2019-1097 high
- CVE-2019-1089 critical
- CVE-2019-1095 high
- CVE-2019-1096 high
- CVE-2019-1100 high
- CVE-2019-1132 critical
- CVE-2019-1006 critical
- CVE-2019-1088 critical
- CVE-2019-1071 high
- CVE-2019-1094 high
- CVE-2019-1098 high
- CVE-2019-1102 critical
- CVE-2019-1085 critical
- CVE-2019-0887 critical
- CVE-2019-1073 high
- CVE-2019-1082 critical
- CVE-2019-1063 critical
- CVE-2019-1104 critical
- CVE-2019-1059 critical
- CVE-2019-1004 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!