Description
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code.
Fiches de renseignement originales
- CVE-2019-0543
- CVE-2019-0536
- CVE-2019-0554
- CVE-2019-0569
- CVE-2019-0579
- CVE-2019-0578
- CVE-2019-0584
- CVE-2019-0549
- CVE-2019-0582
- CVE-2019-0583
- CVE-2019-0580
- CVE-2019-0581
- CVE-2019-0577
- CVE-2019-0576
- CVE-2019-0575
- CVE-2019-0541
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produits associés
- Microsoft-Internet-Explorer
- Microsoft-Office
- Microsoft-Excel
- Microsoft-Word
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
Liste CVE
- CVE-2019-0549 high
- CVE-2019-0583 critical
- CVE-2019-0543 critical
- CVE-2019-0580 critical
- CVE-2019-0569 high
- CVE-2019-0577 critical
- CVE-2019-0554 high
- CVE-2019-0581 critical
- CVE-2019-0582 critical
- CVE-2019-0579 critical
- CVE-2019-0536 high
- CVE-2019-0578 critical
- CVE-2019-0584 critical
- CVE-2019-0538 critical
- CVE-2019-0576 critical
- CVE-2019-0575 critical
- CVE-2019-0541 critical
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !