vulnerability
Microsoft Windows: CVE-2019-1367: Scripting Engine Memory Corruption Vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | Sep 23, 2019 | Sep 23, 2019 | Sep 10, 2025 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Sep 23, 2019
Added
Sep 23, 2019
Modified
Sep 10, 2025
Description
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1221.
Solutions
microsoft-windows-windows_10-1507-kb4520011microsoft-windows-windows_10-1607-kb4519998microsoft-windows-windows_10-1703-kb4520010microsoft-windows-windows_10-1709-kb4520004microsoft-windows-windows_10-1803-kb4520008microsoft-windows-windows_10-1809-kb4519338microsoft-windows-windows_10-1903-kb4517389microsoft-windows-windows_server_2016-1607-kb4519998microsoft-windows-windows_server_2019-1809-kb4519338msft-kb4517389-c417813c-d3db-4b44-83f8-60de59e73b91msft-kb4519974-0044a86b-9ff7-4e99-bbe6-44263c2c38b3msft-kb4519974-4675ef76-6151-4cfb-9d78-f2d7ec200a30msft-kb4519974-71e3c671-6eab-420a-9703-fb55ee914e8dmsft-kb4519974-921d575f-c48d-41c9-82fd-d3d5df9f3adcmsft-kb4519974-9a3d55fd-a8bf-4efd-827a-82ebe9cbe23fmsft-kb4519974-9d7b38d5-cf83-4725-8ded-806e758e74a5msft-kb4519974-a8c5f8c8-d0ee-4215-b88b-7067a65cfadamsft-kb4519974-a9ac4f32-9b3e-4988-a35f-1a1fecfc2051msft-kb4519974-b8827576-e4ba-44aa-a63e-ec7992c2cc97msft-kb4519974-e594ae26-cf40-44c1-8fd2-7c6d1ae2b5dcmsft-kb4519974-e5d664a3-03c5-4bc0-b6a3-d37d7c09efd5msft-kb4519974-e964c71c-4f5e-4ba1-8d62-f28f0850c9f0msft-kb4519974-f5a2187f-3861-4963-9c6f-d4727c4712e5msft-kb4522007-16f56306-5f2e-444c-8f71-8de183e58b07msft-kb4522007-1be44328-080a-4ace-8da8-44e1a2ad031dmsft-kb4522007-3ccaff8d-b2da-42ba-9dea-8deb09cb8313msft-kb4522007-41b13a9c-4e9a-4788-b0a8-eb57324e79aamsft-kb4522007-4322a3ee-434c-407b-a9bd-483192a09a70msft-kb4522007-44a8ee00-1c26-4ec9-89b0-538c8ca3c748msft-kb4522007-48e8dace-fd30-4a3c-93ed-749bfe7f28demsft-kb4522007-492b5c12-13cd-4c8d-959f-2dfc20c368admsft-kb4522007-613b6dae-5fc9-4f88-b75e-9d7d8decc91cmsft-kb4522007-83b7c8f2-4aa7-4bb3-a823-933fe383c184msft-kb4522007-852bd40d-46f8-4367-8037-28ff5a1a393bmsft-kb4522007-aadeb8ac-6899-4b21-8fad-29ee5fa3ea58msft-kb4522007-c2295e81-1cde-4c2a-a3dd-1d813c5d3e85msft-kb4522007-ce9a3561-2cb8-403b-9e1f-a9ee3bb29f80msft-kb4522007-ef1d36b7-85a0-459d-a98b-f38cd145b37cmsft-kb4522007-fb1e1e4b-e948-456f-b0f7-12b220bffb4cmsft-kb4522016-42590274-64fb-4bec-b1c6-cac96e7cab98msft-kb4524135-16216817-6043-4587-a803-9b3a9f3a58ccmsft-kb4524135-18552c40-7e36-4f15-960a-9717a4912af1msft-kb4524135-2661795f-8beb-468f-9c4f-0de83724a90fmsft-kb4524135-2ca3d95f-1ecb-4850-aeb4-afb63cd6374amsft-kb4524135-375f016c-b4ac-4d71-9dee-8095427a3c86msft-kb4524135-393d67e1-8827-4c6d-9187-b6320a9a03bcmsft-kb4524135-63cc9ae6-6d02-4936-8b77-b976b440ff25msft-kb4524135-72890150-da44-47b2-b1b5-7dce2d5d1a30msft-kb4524135-9668152f-78a1-44f9-a229-38e86189703amsft-kb4524135-96c42c78-234b-4ae7-b097-be0eb8ac6f25msft-kb4524135-a22dcbac-485a-4834-8556-fee2e437ab9bmsft-kb4524135-b18abca1-c8ec-4e43-9fa0-cc2b2a518304msft-kb4524135-db62995c-3814-4fd7-a481-dc285f0640e2msft-kb4524135-e08d28ef-d685-412c-b0bc-8cc26bf899c3msft-kb4524135-ef31383a-7932-441a-a626-f0a145cc422amsft-kb4524135-fba96f27-5955-45e1-82e5-ad350b4627e0msft-kb4524147-1fed5556-1c81-4a57-b57a-2baae1c96ae0
References
- CVE-2019-1367
- https://attackerkb.com/topics/CVE-2019-1367
- CWE-787
- URL-https://support.microsoft.com/help/4517389
- URL-https://support.microsoft.com/help/4519338
- URL-https://support.microsoft.com/help/4519974
- URL-https://support.microsoft.com/help/4519998
- URL-https://support.microsoft.com/help/4520004
- URL-https://support.microsoft.com/help/4520008
- URL-https://support.microsoft.com/help/4520010
- URL-https://support.microsoft.com/help/4520011
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.