A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka "MSHTML Engine Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Microsoft Excel Viewer, Internet Explorer 10, Office 365 ProPlus.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/106402 | Broken Link Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/46536/ | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/106402 | Broken Link Third Party Advisory VDB Entry |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541 | Patch Vendor Advisory |
https://www.exploit-db.com/exploits/46536/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
10 Apr 2025, 16:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/106402 - Broken Link, Third Party Advisory, VDB Entry | |
First Time |
Microsoft windows 10 1809
Microsoft windows 10 1507 Microsoft windows 10 1803 Microsoft windows 10 1607 Microsoft windows 10 1709 Microsoft windows 10 1703 |
|
CPE | cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:* |
Information
Published : 2019-01-08 21:29
Updated : 2025-04-10 16:56
NVD link : CVE-2019-0541
Mitre link : CVE-2019-0541
CVE.ORG link : CVE-2019-0541
JSON object : View
Products Affected
microsoft
- windows_server_2019
- office
- windows_server_2016
- excel_viewer
- windows_10_1703
- office_365_proplus
- windows_server_2012
- windows_10_1809
- office_word_viewer
- windows_10_1709
- windows_rt_8.1
- windows_8.1
- windows_server_2008
- windows_10_1803
- windows_7
- windows_10_1607
- internet_explorer
- windows_10_1507
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')