Latest CVE Feed
-
8.5
HIGHCVE-2019-1043
A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who suc... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows_10_1607 +8 more products- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.8
HIGHCVE-2019-1041
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; ... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
5.9
MEDIUMCVE-2019-1040
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection. An attacker who successfully exploited this vulnerability could gain the ability to d... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows_10_1607 +8 more products- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
5.5
MEDIUMCVE-2019-1039
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited thi... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows_10_1607 +8 more products- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.6
HIGHCVE-2019-1038
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacke... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
5.4
MEDIUMCVE-2019-1036
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a speciall... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
9.3
HIGHCVE-2019-1035
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security cont... Read more
Affected Products : office office_365_proplus sharepoint_server office_online_server sharepoint_server_2019 office_2019- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
9.3
HIGHCVE-2019-1034
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security cont... Read more
Affected Products : sharepoint_enterprise_server office word office_365_proplus sharepoint_server office_web_apps excel office_online_server sharepoint_server_2016 word_2016 +2 more products- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
5.4
MEDIUMCVE-2019-1033
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a speciall... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
5.4
MEDIUMCVE-2019-1032
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a speciall... Read more
Affected Products : sharepoint_enterprise_server sharepoint_server sharepoint_server_2016 sharepoint_server_2019- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
5.4
MEDIUMCVE-2019-1031
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a speciall... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.1
HIGHCVE-2019-1029
A denial of service vulnerability exists in Skype for Business. An attacker who successfully exploited the vulnerability could cause Skype for Business to stop responding. Note that the denial of service would not allow an attacker to execute code or to e... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.8
HIGHCVE-2019-1028
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows_10_1607 +7 more products- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.8
HIGHCVE-2019-1027
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.8
HIGHCVE-2019-1026
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.8
HIGHCVE-2019-1025
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to l... Read more
Affected Products : windows_10 windows_7 windows_8.1 windows_rt_8.1 windows_server_2008 windows_server_2012 windows_server_2016 windows_server_2019 windows_server windows_10_1607 +8 more products- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.6
HIGHCVE-2019-1024
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based). The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the co... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
6.5
MEDIUMCVE-2019-1023
An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s syste... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.8
HIGHCVE-2019-1022
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that... Read more
Affected Products : windows_10 windows_server_2016 windows_server_2019 windows_server windows_10_1809 windows windows_server_1903- Published: Jun. 12, 2019
- Modified: May. 20, 2025
-
7.8
HIGHCVE-2019-1021
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that... Read more
- Published: Jun. 12, 2019
- Modified: May. 20, 2025