Description
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information, gain privileges, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A spoofing vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to spoof user interface.
- An information disclosure vulnerability in Microsoft Edge can be exploited remotely via specially crafted content to obtain sensitive information.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely to obtain sensitive information.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Scripting Engine can be exploited remotely to gain privileges.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely to bypass security restrictions.
- A memory corruption vulnerability in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely via specially crafted content to obtain sensitive information.
- An information disclosure vulnerability in Internet Explorer can be exploited remotely to obtain sensitive information.
Fiches de renseignement originales
- CVE-2019-0654
- CVE-2019-0640
- CVE-2019-0610
- CVE-2019-0605
- CVE-2019-0607
- CVE-2019-0655
- CVE-2019-0643
- CVE-2019-0651
- CVE-2019-0648
- CVE-2019-0650
- CVE-2019-0649
- CVE-2019-0634
- CVE-2019-0641
- CVE-2019-0652
- CVE-2019-0590
- CVE-2019-0606
- CVE-2019-0591
- CVE-2019-0658
- CVE-2019-0645
- CVE-2019-0593
- CVE-2019-0642
- CVE-2019-0676
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
Liste CVE
- CVE-2019-0607 critical
- CVE-2019-0644 critical
- CVE-2019-0593 critical
- CVE-2019-0642 critical
- CVE-2019-0590 critical
- CVE-2019-0651 critical
- CVE-2019-0652 critical
- CVE-2019-0655 critical
- CVE-2019-0640 critical
- CVE-2019-0605 critical
- CVE-2019-0658 high
- CVE-2019-0610 critical
- CVE-2019-0649 critical
- CVE-2019-0591 critical
- CVE-2019-0654 warning
- CVE-2019-0643 warning
- CVE-2019-0648 warning
- CVE-2019-0650 critical
- CVE-2019-0634 critical
- CVE-2019-0641 high
- CVE-2019-0606 critical
- CVE-2019-0645 critical
- CVE-2019-0676 high
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !