Description
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Microsoft Browser can be exploited remotely via specially crafted content to obtain sensitive information.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted to bypass security restrictions.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely via specially crafted content to obtain sensitive information.
- A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
Fiches de renseignement originales
- CVE-2019-1051
- CVE-2019-1054
- CVE-2019-0993
- CVE-2019-1024
- CVE-2019-0989
- CVE-2019-0990
- CVE-2019-1038
- CVE-2019-1002
- CVE-2019-1005
- CVE-2019-1055
- CVE-2019-0991
- CVE-2019-1023
- CVE-2019-1080
- CVE-2019-0992
- CVE-2019-1003
- CVE-2019-0988
- CVE-2019-1052
- CVE-2019-0920
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
Liste CVE
- CVE-2019-1081 warning
- CVE-2019-1051 critical
- CVE-2019-1054 high
- CVE-2019-0993 critical
- CVE-2019-1024 critical
- CVE-2019-0989 critical
- CVE-2019-0990 warning
- CVE-2019-1038 critical
- CVE-2019-1002 critical
- CVE-2019-1005 critical
- CVE-2019-1055 critical
- CVE-2019-0991 critical
- CVE-2019-1023 warning
- CVE-2019-1080 critical
- CVE-2019-0992 critical
- CVE-2019-1003 critical
- CVE-2019-0988 critical
- CVE-2019-1052 critical
- CVE-2019-0920 critical
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !