Описание
Multiple vulnerabilities were found in Microsoft Browsers. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Microsoft Browser can be exploited remotely via specially crafted content to obtain sensitive information.
- A memory corruption vulnerability in Chakra Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Edge can be exploited remotely via specially crafted to bypass security restrictions.
- An information disclosure vulnerability in Scripting Engine can be exploited remotely via specially crafted content to obtain sensitive information.
- A memory corruption vulnerability in Microsoft Browser can be exploited remotely via specially crafted website to execute arbitrary code.
- A memory corruption vulnerability in Scripting Engine can be exploited remotely via specially crafted website to execute arbitrary code.
Первичный источник обнаружения
- CVE-2019-1081
CVE-2019-1051
CVE-2019-1054
CVE-2019-0993
CVE-2019-1024
CVE-2019-0989
CVE-2019-0990
CVE-2019-1038
CVE-2019-1002
CVE-2019-1005
CVE-2019-1055
CVE-2019-0991
CVE-2019-1023
CVE-2019-1080
CVE-2019-0992
CVE-2019-1003
CVE-2019-0988
CVE-2019-1052
CVE-2019-0920
Эксплуатация
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2019-1081 warning
- CVE-2019-1051 critical
- CVE-2019-1054 high
- CVE-2019-0993 critical
- CVE-2019-1024 critical
- CVE-2019-0989 critical
- CVE-2019-0990 warning
- CVE-2019-1038 critical
- CVE-2019-1002 critical
- CVE-2019-1005 critical
- CVE-2019-1055 critical
- CVE-2019-0991 critical
- CVE-2019-1023 warning
- CVE-2019-1080 critical
- CVE-2019-0992 critical
- CVE-2019-1003 critical
- CVE-2019-0988 critical
- CVE-2019-1052 critical
- CVE-2019-0920 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!