cve/2019/CVE-2019-1429.md

51 lines
4.9 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-1429](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1429)
![](https://img.shields.io/static/v1?label=Product&message=Internet%20Explorer%2010&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Internet%20Explorer%2011%20on%20Windows%2010%20Version%201903%20for%2032-bit%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Internet%20Explorer%2011%20on%20Windows%2010%20Version%201903%20for%20ARM64-based%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Internet%20Explorer%2011%20on%20Windows%2010%20Version%201903%20for%20x64-based%20Systems&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Internet%20Explorer%2011%20on%20Windows%20Server%202012&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Internet%20Explorer%2011&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Internet%20Explorer%209&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201607%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201607%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201709%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201709%20for%20ARM64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201709%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201803%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201803%20for%20ARM64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201803%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201809%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201809%20for%20ARM64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20Version%201809%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20for%2032-bit%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%2010%20for%20x64-based%20Systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%207%20for%2032-bit%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%207%20for%20x64-based%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%208.1%20for%2032-bit%20systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%208.1%20for%20x64-based%20systems%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20RT%208.1%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20Server%202008%20R2%20for%20x64-based%20Systems%20Service%20Pack%201%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20Server%202008%20for%2032-bit%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20Server%202008%20for%20x64-based%20Systems%20Service%20Pack%202%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20Server%202012%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20Server%202012%20R2%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20Server%202016%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Windows%20Server%202019%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=unspecified%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Remote%20Code%20Execution&color=brightgreen)
2024-05-26 14:27:05 +02:00
### Description
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1426, CVE-2019-1427, CVE-2019-1428.
### POC
#### Reference
- http://packetstormsecurity.com/files/155433/Microsoft-Internet-Explorer-Use-After-Free.html
#### Github
2025-09-29 21:09:30 +02:00
- https://github.com/ARPSyndicate/cve-scores
2024-05-26 14:27:05 +02:00
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors