vulnerability
Microsoft Windows: CVE-2019-1367: Scripting Engine Memory Corruption Vulnerability
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:H/Au:N/C:C/I:C/A:C) | Sep 23, 2019 | Sep 23, 2019 | Sep 6, 2024 |
Severity
8
CVSS
(AV:N/AC:H/Au:N/C:C/I:C/A:C)
Published
Sep 23, 2019
Added
Sep 23, 2019
Modified
Sep 6, 2024
Description
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1221.
Solution(s)
microsoft-windows-windows_10-1507-kb4520011microsoft-windows-windows_10-1607-kb4519998microsoft-windows-windows_10-1703-kb4520010microsoft-windows-windows_10-1709-kb4520004microsoft-windows-windows_10-1803-kb4520008microsoft-windows-windows_10-1809-kb4519338microsoft-windows-windows_10-1903-kb4517389microsoft-windows-windows_server_2012-kb4519974microsoft-windows-windows_server_2012_r2-kb4519974microsoft-windows-windows_server_2016-1607-kb4519998microsoft-windows-windows_server_2019-1809-kb4519338msft-kb4517389-c417813c-d3db-4b44-83f8-60de59e73b91msft-kb4519974-0044a86b-9ff7-4e99-bbe6-44263c2c38b3msft-kb4519974-4675ef76-6151-4cfb-9d78-f2d7ec200a30msft-kb4519974-71e3c671-6eab-420a-9703-fb55ee914e8dmsft-kb4519974-921d575f-c48d-41c9-82fd-d3d5df9f3adcmsft-kb4519974-9a3d55fd-a8bf-4efd-827a-82ebe9cbe23fmsft-kb4519974-9d7b38d5-cf83-4725-8ded-806e758e74a5msft-kb4519974-a8c5f8c8-d0ee-4215-b88b-7067a65cfadamsft-kb4519974-a9ac4f32-9b3e-4988-a35f-1a1fecfc2051msft-kb4519974-b8827576-e4ba-44aa-a63e-ec7992c2cc97msft-kb4519974-e594ae26-cf40-44c1-8fd2-7c6d1ae2b5dcmsft-kb4519974-e5d664a3-03c5-4bc0-b6a3-d37d7c09efd5msft-kb4519974-e964c71c-4f5e-4ba1-8d62-f28f0850c9f0msft-kb4519974-f5a2187f-3861-4963-9c6f-d4727c4712e5msft-kb4522007-16f56306-5f2e-444c-8f71-8de183e58b07msft-kb4522007-1be44328-080a-4ace-8da8-44e1a2ad031dmsft-kb4522007-3ccaff8d-b2da-42ba-9dea-8deb09cb8313msft-kb4522007-41b13a9c-4e9a-4788-b0a8-eb57324e79aamsft-kb4522007-4322a3ee-434c-407b-a9bd-483192a09a70msft-kb4522007-44a8ee00-1c26-4ec9-89b0-538c8ca3c748msft-kb4522007-48e8dace-fd30-4a3c-93ed-749bfe7f28demsft-kb4522007-492b5c12-13cd-4c8d-959f-2dfc20c368admsft-kb4522007-613b6dae-5fc9-4f88-b75e-9d7d8decc91cmsft-kb4522007-83b7c8f2-4aa7-4bb3-a823-933fe383c184msft-kb4522007-852bd40d-46f8-4367-8037-28ff5a1a393bmsft-kb4522007-aadeb8ac-6899-4b21-8fad-29ee5fa3ea58msft-kb4522007-c2295e81-1cde-4c2a-a3dd-1d813c5d3e85msft-kb4522007-ce9a3561-2cb8-403b-9e1f-a9ee3bb29f80msft-kb4522007-ef1d36b7-85a0-459d-a98b-f38cd145b37cmsft-kb4522007-fb1e1e4b-e948-456f-b0f7-12b220bffb4cmsft-kb4522016-42590274-64fb-4bec-b1c6-cac96e7cab98msft-kb4524135-16216817-6043-4587-a803-9b3a9f3a58ccmsft-kb4524135-18552c40-7e36-4f15-960a-9717a4912af1msft-kb4524135-2661795f-8beb-468f-9c4f-0de83724a90fmsft-kb4524135-2ca3d95f-1ecb-4850-aeb4-afb63cd6374amsft-kb4524135-375f016c-b4ac-4d71-9dee-8095427a3c86msft-kb4524135-393d67e1-8827-4c6d-9187-b6320a9a03bcmsft-kb4524135-63cc9ae6-6d02-4936-8b77-b976b440ff25msft-kb4524135-72890150-da44-47b2-b1b5-7dce2d5d1a30msft-kb4524135-9668152f-78a1-44f9-a229-38e86189703amsft-kb4524135-96c42c78-234b-4ae7-b097-be0eb8ac6f25msft-kb4524135-a22dcbac-485a-4834-8556-fee2e437ab9bmsft-kb4524135-b18abca1-c8ec-4e43-9fa0-cc2b2a518304msft-kb4524135-db62995c-3814-4fd7-a481-dc285f0640e2msft-kb4524135-e08d28ef-d685-412c-b0bc-8cc26bf899c3msft-kb4524135-ef31383a-7932-441a-a626-f0a145cc422amsft-kb4524135-fba96f27-5955-45e1-82e5-ad350b4627e0msft-kb4524147-1fed5556-1c81-4a57-b57a-2baae1c96ae0
References
- CVE-2019-1367
- https://attackerkb.com/topics/CVE-2019-1367
- URL-https://support.microsoft.com/help/4517389
- URL-https://support.microsoft.com/help/4519338
- URL-https://support.microsoft.com/help/4519974
- URL-https://support.microsoft.com/help/4519998
- URL-https://support.microsoft.com/help/4520004
- URL-https://support.microsoft.com/help/4520008
- URL-https://support.microsoft.com/help/4520010
- URL-https://support.microsoft.com/help/4520011

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.