Descripción
Multiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Windows can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code.
Notas informativas originales
- CVE-2019-0543
- CVE-2019-0536
- CVE-2019-0554
- CVE-2019-0569
- CVE-2019-0579
- CVE-2019-0578
- CVE-2019-0584
- CVE-2019-0549
- CVE-2019-0582
- CVE-2019-0583
- CVE-2019-0580
- CVE-2019-0581
- CVE-2019-0577
- CVE-2019-0576
- CVE-2019-0575
- CVE-2019-0541
Explotación
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
- Microsoft-Internet-Explorer
- Microsoft-Office
- Microsoft-Excel
- Microsoft-Word
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-Server-2012
- Microsoft-Windows-8
- Microsoft-Windows-7
- Microsoft-Windows-Server-2008
- Windows-RT
- Microsoft-Windows-10
Lista CVE
- CVE-2019-0549 high
- CVE-2019-0583 critical
- CVE-2019-0543 critical
- CVE-2019-0580 critical
- CVE-2019-0569 high
- CVE-2019-0577 critical
- CVE-2019-0554 high
- CVE-2019-0581 critical
- CVE-2019-0582 critical
- CVE-2019-0579 critical
- CVE-2019-0536 high
- CVE-2019-0578 critical
- CVE-2019-0584 critical
- CVE-2019-0538 critical
- CVE-2019-0576 critical
- CVE-2019-0575 critical
- CVE-2019-0541 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!