Microsoft released new security updates for February under patch Tuesday with the fixes for more than 70 vulnerabilities that affected Microsoft products.
This is a second security update for this month and the first security advisory Microsoft releases on earlier of this month for the fixes of Privilege Escalation Vulnerability With Exchange Server.
Most of the vulnerabilities reported by various independent security researchers around the globe for the following Microsoft products.
Microsoft fixed an active Internet Explorer zero-day vulnerability (CVE-2019-0676) in the security updates and the bug allow attackers to send open a malicious website link to exploit the browser flaw.
Also in another bug critical bug in Microsoft’s Exchange Server (CVE-2019-0686) allows a remote attacker with a simple mailbox account to gain administrator privileges.
A Remote code execution vulnerability (CVE-2019-0640) that affected Microsoft Edge browser scripting engine handles also fixed in this security updates.
Edge Flaw allows an attacker who successfully exploited the vulnerability could gain the same user rights as the current user and if the current user logged in as admin then it could lead an attack to gain admin level access and take full control of the affected system.
There are 18 vulnerabilities are marked as critical severity and the vulnerabilities categories under Remote Code Execution and script engine Memory Corruption.
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0655 | Critical |
Microsoft Edge Memory Corruption Vulnerability | CVE-2019-0650 | Critical |
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0651 | Critical |
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0652 | Critical |
Microsoft Edge Memory Corruption Vulnerability | CVE-2019-0645 | Critical |
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0642 | Critical |
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0640 | Critical |
Windows DHCP Server Remote Code Execution Vulnerability | CVE-2019-0626 | Critical |
GDI+ Remote Code Execution Vulnerability | CVE-2019-0618 | Critical |
Microsoft SharePoint RCE Vulnerability | CVE-2019-0604 | Critical |
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0605 | Critical |
Internet Explorer Memory Corruption Vulnerability | CVE-2019-0606 | Critical |
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0607 | Critical |
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0590 | Critical |
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0591 | Critical |
Scripting Engine Memory Corruption Vulnerability | CVE-2019-0593 | Critical |
Microsoft SharePoint RCE Vulnerability | CVE-2019-0594 | Critical |
Another fix Microsoft released for Critical DHCP vulnerability (CVE-2019-0626) this month that could allow an attacker to send a specially crafted packet to a DHCP server
Also, Microsoft fixed all the office vulnerabilities that include 19 security updates and 28 non-security updates.
Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised…
Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack…
The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in…
A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto…
Threat Analysts have reported alarming findings about the "Araneida Scanner," a malicious tool allegedly based…
A major dark web operation dedicated to circumventing KYC (Know Your Customer) procedures, which involves…