Kaspersky ID:
KLA11462
Detect Date:
04/09/2019
Updated:
12/08/2024

Description

Multiple vulnerabilities were found in Microsoft browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  2. A tampering vulnerability in Microsoft Browsers can be exploited remotely via specially crafted website to spoof user interface.
  3. A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
  4. An information disclosure vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to obtain sensitive information.
  5. An information disclosure vulnerability in Microsoft Scripting Engine can be exploited remotely via specially crafted content to obtain sensitive information.

Original advisories

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Related products

CVE list

  • CVE-2019-0829
    critical
  • CVE-2019-0806
    critical
  • CVE-2019-0810
    critical
  • CVE-2019-0812
    critical
  • CVE-2019-0860
    critical
  • CVE-2019-0739
    critical
  • CVE-2019-0861
    critical
  • CVE-2019-0764
    high
  • CVE-2019-0752
    critical
  • CVE-2019-0862
    critical
  • CVE-2019-0833
    high
  • CVE-2019-0835
    high
  • CVE-2019-0753
    critical

KB list

Read more

Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com

Found an inaccuracy in the description of this vulnerability? Let us know!
Kaspersky Next
Let’s go Next: redefine your business’s cybersecurity
Learn more
New Kaspersky!
Your digital life deserves complete protection!
Learn more
Confirm changes?
Your message has been sent successfully.