Wednesday, May 14, 2025
HomeComputer SecurityMicrosoft Released Security Updates & Fixed More than 70 Flaws Along with...

Microsoft Released Security Updates & Fixed More than 70 Flaws Along with Active Zero-Day Browser Bug

Published on

SIEM as a Service

Follow Us on Google News

Microsoft released new security updates for February under patch Tuesday with the fixes for more than 70 vulnerabilities that affected Microsoft products.

This is a second security update for this month and the first security advisory Microsoft releases on earlier of this month for the fixes of Privilege Escalation Vulnerability With Exchange Server.

Most of the vulnerabilities reported by various independent security researchers around the globe for the following Microsoft products.

- Advertisement - Google News
  • Internet Explorer
  • Microsoft Edge
  • Microsoft Windows
  • Microsoft Office and Microsoft Office Services and Web Apps
  • ChakraCore
  • .NET Framework
  • Microsoft Exchange Server
  • Microsoft Visual Studio
  • Azure IoT SDK
  • Microsoft Dynamics
  • Team Foundation Server
  • Visual Studio Code

Microsoft fixed an active Internet Explorer zero-day vulnerability (CVE-2019-0676) in the security updates and the bug allow attackers to send open a malicious website link to exploit the browser flaw.

Also in another bug critical bug in Microsoft’s Exchange Server  (CVE-2019-0686) allows a remote attacker with a simple mailbox account to gain administrator privileges.

A Remote code execution vulnerability (CVE-2019-0640) that affected Microsoft Edge browser scripting engine handles also fixed in this security updates.

Edge Flaw allows an attacker who successfully exploited the vulnerability could gain the same user rights as the current user and if the current user logged in as admin then it could lead an attack to gain admin level access and take full control of the affected system.

There are 18 vulnerabilities are marked as critical severity and the vulnerabilities categories under Remote Code Execution and script engine Memory Corruption.

Critical Vulnerabilities list

Scripting Engine Memory Corruption VulnerabilityCVE-2019-0655Critical
Microsoft Edge Memory Corruption VulnerabilityCVE-2019-0650Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2019-0651Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2019-0652Critical
Microsoft Edge Memory Corruption Vulnerability CVE-2019-0645Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2019-0642Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2019-0640Critical
Windows DHCP Server Remote Code Execution VulnerabilityCVE-2019-0626Critical
GDI+ Remote Code Execution VulnerabilityCVE-2019-0618Critical
Microsoft SharePoint RCE Vulnerability CVE-2019-0604Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2019-0605Critical
Internet Explorer Memory Corruption VulnerabilityCVE-2019-0606Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2019-0607Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2019-0590Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2019-0591Critical
Scripting Engine Memory Corruption VulnerabilityCVE-2019-0593Critical
Microsoft SharePoint RCE VulnerabilityCVE-2019-0594Critical

Another fix Microsoft released for Critical DHCP vulnerability (CVE-2019-0626) this month that could allow an attacker to send a specially crafted packet to a DHCP server

Also, Microsoft fixed all the office vulnerabilities that include 19 security updates and 28 non-security updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...

Researchers Unveil New Threat-Hunting Techniques to Detect Azure Managed Identity Abuse

A group of cybersecurity specialists from Hunters, working under the prestigious Team Axon, have...

Windows CLFS Zero-Day Vulnerability Actively Exploited in the Wild

Microsoft has disclosed two critical security vulnerabilities in the Windows Common Log File System...

Critical Samsung MagicINFO 9 Server Flaw Allows Arbitrary File Writes

Samsung’s SmartTV and digital signage ecosystem faces renewed cybersecurity scrutiny following the disclosure of...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Chinese Hackers Exploit SAP NetWeaver Zero-Day Vulnerability to Target Critical Infrastructure

EclecticIQ analysts have uncovered a sophisticated cyber-espionage campaign orchestrated by China-nexus nation-state Advanced Persistent...

Windows CLFS Zero-Day Vulnerability Actively Exploited in the Wild

Microsoft has disclosed two critical security vulnerabilities in the Windows Common Log File System...

Critical Samsung MagicINFO 9 Server Flaw Allows Arbitrary File Writes

Samsung’s SmartTV and digital signage ecosystem faces renewed cybersecurity scrutiny following the disclosure of...