Description
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows SMB Client Driver can be exploited remotely via specially crafted application to obtain sensitive information.
- A cross-site-scripting (XSS) vulnerability Active Directory Federation Services can be exploited remotely via specially crafted request to spoof user interface.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Windows Store Installer can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in DirectWrite can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in DirectX can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Data Sharing Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Diagnostics Hub Standard Collector Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Media can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Microsoft Compatibility Appraiser can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in LNK can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Network Connectivity Assistant can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Audio Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Winlogon can be exploited remotely via specially crafted application to gain privileges.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
- An elevation of privilege vulnerability in Windows Update Delivery Optimization can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Transaction Manager can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A security feature bypass vulnerability in Windows Secure Boot can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Text Service Framework can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.
Original advisories
- CVE-2019-0788
- CVE-2019-0928
- CVE-2019-1214
- CVE-2019-1215
- CVE-2019-1216
- CVE-2019-1219
- CVE-2019-1232
- CVE-2019-1235
- CVE-2019-1244
- CVE-2019-1245
- CVE-2019-1251
- CVE-2019-1252
- CVE-2019-1253
- CVE-2019-1254
- CVE-2019-1256
- CVE-2019-1267
- CVE-2019-1268
- CVE-2019-1269
- CVE-2019-1270
- CVE-2019-1271
- CVE-2019-1272
- CVE-2019-1273
- CVE-2019-1274
- CVE-2019-1277
- CVE-2019-1278
- CVE-2019-1280
- CVE-2019-1282
- CVE-2019-1285
- CVE-2019-1286
- CVE-2019-1287
- CVE-2019-1289
- CVE-2019-1290
- CVE-2019-1291
- CVE-2019-1292
- CVE-2019-1293
- CVE-2019-1294
- CVE-2019-1303
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-8
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
CVE list
- CVE-2019-1292 high
- CVE-2019-1215 high
- CVE-2019-1293 high
- CVE-2019-1273 high
- CVE-2019-0788 high
- CVE-2019-1270 high
- CVE-2019-1286 high
- CVE-2019-1252 high
- CVE-2019-1291 high
- CVE-2019-1251 high
- CVE-2019-1216 high
- CVE-2019-1278 high
- CVE-2019-1272 high
- CVE-2019-1256 high
- CVE-2019-1303 unknown
- CVE-2019-1232 high
- CVE-2019-1271 high
- CVE-2019-0787 high
- CVE-2019-1290 high
- CVE-2019-1269 high
- CVE-2019-1244 high
- CVE-2019-1253 high
- CVE-2019-1267 high
- CVE-2019-1280 high
- CVE-2019-1287 high
- CVE-2019-1277 high
- CVE-2019-1268 high
- CVE-2019-1285 high
- CVE-2019-0928 high
- CVE-2019-1289 high
- CVE-2019-1219 high
- CVE-2019-1214 high
- CVE-2019-1282 high
- CVE-2019-1274 high
- CVE-2019-1294 high
- CVE-2019-1235 high
- CVE-2019-1254 high
- CVE-2019-1245 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!