Description
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A memory corruption vulnerability in Microsoft browsers can be exploited remotely via specially crafted website to execute arbitrary code.
- Multiple memory corruption vulnerabilities in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A spoofing vulnerability in Internet Explorer can be exploited remotely via specially crafted website to spoof user interface.
- A security feature bypass vulnerability in Internet Explorer can be exploited remotely via specially crafted file to bypass security restrictions.
- Multiple memory corruption vulnerabilities in Internet Explorer can be exploited remotely via specially crafted website to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Edge can be exploited remotely to gain privileges.
- A memory corruption vulnerability in Microsoft Edge can be exploited remotely via specially crafted website to execute arbitrary code.
- Multiple memory corruption vulnerabilities in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- An information disclosure vulnerability in Internet Explorer can be exploited remotely via specially crafted content to obtain sensitive information.
Fiches de renseignement originales
- CVE-2019-0937
- CVE-2019-0924
- CVE-2019-0913
- CVE-2019-0921
- CVE-2019-0995
- CVE-2019-0918
- CVE-2019-0923
- CVE-2019-0912
- CVE-2019-0929
- CVE-2019-0925
- CVE-2019-0915
- CVE-2019-0927
- CVE-2019-0933
- CVE-2019-0916
- CVE-2019-0938
- CVE-2019-0926
- CVE-2019-0914
- CVE-2019-0911
- CVE-2019-0884
- CVE-2019-0930
- CVE-2019-0917
- CVE-2019-0922
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
Liste CVE
- CVE-2019-0940 critical
- CVE-2019-0937 critical
- CVE-2019-0924 critical
- CVE-2019-0913 critical
- CVE-2019-0921 warning
- CVE-2019-0995 high
- CVE-2019-0918 critical
- CVE-2019-0923 critical
- CVE-2019-0912 critical
- CVE-2019-0929 critical
- CVE-2019-0925 critical
- CVE-2019-0915 critical
- CVE-2019-0927 critical
- CVE-2019-0933 critical
- CVE-2019-0916 critical
- CVE-2019-0938 high
- CVE-2019-0926 critical
- CVE-2019-0914 critical
- CVE-2019-0911 critical
- CVE-2019-0884 critical
- CVE-2019-0930 warning
- CVE-2019-0917 critical
- CVE-2019-0922 critical
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !