Description
Multiple serious vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to gain privileges, obtain sensitive information and execute arbitrary code.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Windows Data Sharing Service can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Runtime can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft XmlDocument can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in Windows DHCP Client can be exploited remotely via specially crafted application to execute arbitrary code.
- A remote code execution vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to execute arbitrary code.
- An information disclosure vulnerability in Windows Subsystem for Linux can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows COM can be exploited remotely via specially crafted application to gain privileges.
Original advisories
- CVE-2019-0549
- CVE-2019-0570
- CVE-2019-0583
- CVE-2019-0555
- CVE-2019-0543
- CVE-2019-0580
- CVE-2019-0571
- CVE-2019-0547
- CVE-2019-0574
- CVE-2019-0550
- CVE-2019-0569
- CVE-2019-0551
- CVE-2019-0553
- CVE-2019-0573
- CVE-2019-0577
- CVE-2019-0554
- CVE-2019-0581
- CVE-2019-0582
- CVE-2019-0579
- CVE-2019-0536
- CVE-2019-0578
- CVE-2019-0584
- CVE-2019-0552
- CVE-2019-0538
- CVE-2019-0576
- CVE-2019-0575
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2019-0572 high
- CVE-2019-0549 warning
- CVE-2019-0570 warning
- CVE-2019-0583 critical
- CVE-2019-0555 warning
- CVE-2019-0543 warning
- CVE-2019-0580 critical
- CVE-2019-0571 high
- CVE-2019-0547 critical
- CVE-2019-0574 high
- CVE-2019-0550 critical
- CVE-2019-0569 warning
- CVE-2019-0551 critical
- CVE-2019-0553 warning
- CVE-2019-0573 high
- CVE-2019-0577 critical
- CVE-2019-0554 warning
- CVE-2019-0581 critical
- CVE-2019-0582 critical
- CVE-2019-0579 critical
- CVE-2019-0536 warning
- CVE-2019-0578 critical
- CVE-2019-0584 critical
- CVE-2019-0552 warning
- CVE-2019-0538 critical
- CVE-2019-0576 critical
- CVE-2019-0575 critical
KB list
- 4480978
- 4480962
- 4480966
- 4480116
- 4480961
- 4480973
- 4480963
- 4480964
- 4480972
- 4480975
- 4487020
- 4487017
- 4486996
- 4487026
- 4487025
- 4487044
- 4487018
- 4487028
- 4487000
- 4486993
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!