Описание
Multiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface, cause denial of service, bypass security restrictions.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Jet Database Engine can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Windows can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows SMB Client Driver can be exploited remotely via specially crafted application to obtain sensitive information.
- A cross-site-scripting (XSS) vulnerability Active Directory Federation Services can be exploited remotely via specially crafted request to spoof user interface.
- A remote code execution vulnerability in Remote Desktop Client can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Windows Store Installer can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows GDI can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in DirectWrite can be exploited remotely via specially crafted document to obtain sensitive information.
- An information disclosure vulnerability in DirectX can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Data Sharing Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Win32k can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Diagnostics Hub Standard Collector Service can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Media can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows ALPC can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Microsoft Compatibility Appraiser can be exploited remotely via specially crafted application to gain privileges.
- A remote code execution vulnerability in LNK can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Network Connectivity Assistant can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Windows Audio Service can be exploited remotely via specially crafted application to gain privileges.
- An elevation of privilege vulnerability in Winlogon can be exploited remotely via specially crafted application to gain privileges.
- A denial of service vulnerability in Windows Hyper-V can be exploited remotely via specially crafted application to cause denial of service.
- An elevation of privilege vulnerability in Windows Update Delivery Optimization can be exploited remotely to gain privileges.
- An information disclosure vulnerability in Windows Transaction Manager can be exploited remotely via specially crafted application to obtain sensitive information.
- An elevation of privilege vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Common Log File System Driver can be exploited remotely via specially crafted application to obtain sensitive information.
- An information disclosure vulnerability in Windows Kernel can be exploited remotely via specially crafted application to obtain sensitive information.
- A security feature bypass vulnerability in Windows Secure Boot can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Windows Text Service Framework can be exploited remotely via specially crafted application to gain privileges.
- An information disclosure vulnerability in Windows Hyper-V can be exploited remotely to obtain sensitive information.
Первичный источник обнаружения
- CVE-2019-0787
CVE-2019-0788
CVE-2019-0928
CVE-2019-1214
CVE-2019-1215
CVE-2019-1216
CVE-2019-1219
CVE-2019-1232
CVE-2019-1235
CVE-2019-1244
CVE-2019-1245
CVE-2019-1251
CVE-2019-1252
CVE-2019-1253
CVE-2019-1254
CVE-2019-1256
CVE-2019-1267
CVE-2019-1268
CVE-2019-1269
CVE-2019-1270
CVE-2019-1271
CVE-2019-1272
CVE-2019-1273
CVE-2019-1274
CVE-2019-1277
CVE-2019-1278
CVE-2019-1280
CVE-2019-1282
CVE-2019-1285
CVE-2019-1286
CVE-2019-1287
CVE-2019-1289
CVE-2019-1290
CVE-2019-1291
CVE-2019-1292
CVE-2019-1293
CVE-2019-1294
CVE-2019-1303
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
- Microsoft-Windows
- Microsoft-Windows-Server
- Microsoft-Windows-8
- Windows-RT
- Microsoft-Windows-10
- Microsoft-Windows-Server-2016
- Microsoft-Windows-Server-2019
Список CVE
- CVE-2019-1292 high
- CVE-2019-1215 high
- CVE-2019-1293 high
- CVE-2019-1273 high
- CVE-2019-0788 high
- CVE-2019-1270 high
- CVE-2019-1286 high
- CVE-2019-1252 high
- CVE-2019-1291 high
- CVE-2019-1251 high
- CVE-2019-1216 high
- CVE-2019-1278 high
- CVE-2019-1272 high
- CVE-2019-1256 high
- CVE-2019-1303 unknown
- CVE-2019-1232 high
- CVE-2019-1271 high
- CVE-2019-0787 high
- CVE-2019-1290 high
- CVE-2019-1269 high
- CVE-2019-1244 high
- CVE-2019-1253 high
- CVE-2019-1267 high
- CVE-2019-1280 high
- CVE-2019-1287 high
- CVE-2019-1277 high
- CVE-2019-1268 high
- CVE-2019-1285 high
- CVE-2019-0928 high
- CVE-2019-1289 high
- CVE-2019-1219 high
- CVE-2019-1214 high
- CVE-2019-1282 high
- CVE-2019-1274 high
- CVE-2019-1294 high
- CVE-2019-1235 high
- CVE-2019-1254 high
- CVE-2019-1245 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!