Kaspersky ID:
KLA11483
Fecha de detección:
05/14/2019
Actualizado:
01/28/2026

Descripción

Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
  2. An elevation of privilege vulnerability in Windows Error Reporting can be exploited remotely to gain privileges.
  3. An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
  4. An elevation of privilege vulnerability in Unified Write Filter can be exploited remotely to gain privileges.
  5. An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
  6. A remote code execution vulnerability in GDI+ can be exploited remotely via specially crafted website to execute arbitrary code.
  7. An elevation of privilege vulnerability in Diagnostic Hub Standard Collector, Visual Studio Standard Collector can be exploited remotely via specially crafted application to gain privileges.
  8. A remote code execution vulnerability in Windows OLE can be exploited remotely via specially crafted file to execute arbitrary code.
  9. An information disclosure vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to obtain sensitive information.
  10. A security feature bypass vulnerability in Windows Defender Application Control can be exploited remotely to bypass security restrictions.
  11. An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
  12. A remote code execution vulnerability in Windows DHCP Server can be exploited remotely via specially crafted packets to execute arbitrary code.
  13. An elevation of privilege vulnerability in Windows Storage Service can be exploited remotely via specially crafted application to gain privileges.
  14. An elevation of privilege vulnerability in Windows can be exploited remotely to gain privileges.
  15. An elevation of privilege vulnerability in Windows Kernel can be exploited remotely via specially crafted application to gain privileges.
  16. An elevation of privilege vulnerability in Windows NDIS can be exploited remotely via specially crafted application to gain privileges.

Notas informativas originales

Explotación

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Productos relacionados

Lista CVE

  • CVE-2019-0895
    critical
  • CVE-2019-0889
    critical
  • CVE-2019-0863
    critical
  • CVE-2019-0758
    high
  • CVE-2019-0942
    high
  • CVE-2019-0891
    critical
  • CVE-2019-0936
    critical
  • CVE-2019-0900
    critical
  • CVE-2019-0961
    high
  • CVE-2019-0903
    critical
  • CVE-2019-0727
    critical
  • CVE-2019-0885
    critical
  • CVE-2019-0894
    critical
  • CVE-2019-0886
    high
  • CVE-2019-0733
    high
  • CVE-2019-0893
    critical
  • CVE-2019-0902
    critical
  • CVE-2019-0896
    critical
  • CVE-2019-0882
    high
  • CVE-2019-0892
    critical
  • CVE-2019-0897
    critical
  • CVE-2019-0725
    critical
  • CVE-2019-0901
    critical
  • CVE-2019-0931
    high
  • CVE-2019-0898
    critical
  • CVE-2019-0734
    critical
  • CVE-2019-0890
    critical
  • CVE-2019-0881
    critical
  • CVE-2019-0707
    high
  • CVE-2019-0899
    critical

Lista KB

Leer más

Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com

¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!
Kaspersky Next:
ciberseguridad redefinida
Leer más
Nuevo Kaspersky
¡Su vida digital merece una protección completa!
Leer más
Do you want to save your changes?
Your message has been sent successfully.