Vulnerabilities > Microsoft > High

DATE CVE VULNERABILITY TITLE RISK
2019-06-12 CVE-2019-1041 Unspecified vulnerability in Microsoft products
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory.
local
high complexity
microsoft
7.0
2019-06-12 CVE-2019-1038 Out-of-bounds Write vulnerability in Microsoft Edge and Internet Explorer
A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory.
network
high complexity
microsoft CWE-787
7.5
2019-06-12 CVE-2019-1035 Unspecified vulnerability in Microsoft products
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory.
local
low complexity
microsoft
7.8
2019-06-12 CVE-2019-1034 Unspecified vulnerability in Microsoft products
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory.
local
low complexity
microsoft
7.8
2019-06-12 CVE-2019-1028 Unspecified vulnerability in Microsoft products
An elevation of privilege exists in Windows Audio Service.
local
low complexity
microsoft
7.8
2019-06-12 CVE-2019-1027 Unspecified vulnerability in Microsoft products
An elevation of privilege exists in Windows Audio Service.
local
low complexity
microsoft
7.8
2019-06-12 CVE-2019-1026 Unspecified vulnerability in Microsoft products
An elevation of privilege exists in Windows Audio Service.
local
low complexity
microsoft
7.8
2019-06-12 CVE-2019-1022 Unspecified vulnerability in Microsoft products
An elevation of privilege exists in Windows Audio Service.
local
low complexity
microsoft
7.8
2019-06-12 CVE-2019-1021 Unspecified vulnerability in Microsoft products
An elevation of privilege exists in Windows Audio Service.
local
low complexity
microsoft
7.8
2019-06-12 CVE-2019-1019 Information Exposure vulnerability in Microsoft products
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request.
network
high complexity
microsoft CWE-200
8.5