A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka "MSHTML Engine Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Microsoft Excel Viewer, Internet Explorer 10, Office 365 ProPlus.
References
| Link | Resource |
|---|---|
| http://www.securityfocus.com/bid/106402 | Broken Link Third Party Advisory VDB Entry |
| http://www.securityfocus.com/bid/106402 | Broken Link Third Party Advisory VDB Entry |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541 | Patch Vendor Advisory |
| https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541 | Patch Vendor Advisory |
| https://www.exploit-db.com/exploits/46536/ | Exploit Third Party Advisory VDB Entry |
| https://www.exploit-db.com/exploits/46536/ | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
10 Apr 2025, 16:56
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:* |
cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:* cpe:2.3:o:microsoft:windows_10_1803:-:*:*:*:*:*:arm64:* cpe:2.3:o:microsoft:windows_10_1703:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1709:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:* cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:* |
| First Time |
Microsoft windows 10 1803
Microsoft windows 10 1809 Microsoft windows 10 1709 Microsoft windows 10 1607 Microsoft windows 10 1703 Microsoft windows 10 1507 |
|
| References | () http://www.securityfocus.com/bid/106402 - Broken Link, Third Party Advisory, VDB Entry |
07 Feb 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0541 - Patch, Vendor Advisory | |
| References | () https://www.exploit-db.com/exploits/46536/ - Exploit, Third Party Advisory, VDB Entry | |
| References | () http://www.securityfocus.com/bid/106402 - Third Party Advisory, VDB Entry |
Information
Published : 2019-01-08 21:29
Updated : 2025-04-10 16:56
NVD link : CVE-2019-0541
Mitre link : CVE-2019-0541
JSON object : View
Products Affected
microsoft
- windows_7
- windows_8.1
- windows_10_1607
- windows_10_1703
- windows_server_2019
- internet_explorer
- windows_server_2008
- windows_10_1709
- windows_rt_8.1
- windows_server_2012
- office_word_viewer
- windows_10_1809
- windows_server_2016
- excel_viewer
- windows_10_1507
- office
- office_365_proplus
- windows_10_1803
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
