Menu
An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. ![]() However, it includes a link to Microsoft's Security Update Guide portal, where you can find the patches listed:Ĭlicking on the CVE ID ( CVE-2019-1367) will shed some light on the vulnerability fixed in this update.Ī remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. ![]() ![]() ![]() The updates are sharing a short description that simply states Security updates to Internet Explorer.
0 Comments
Leave a Reply. |