"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-11 22:01:15 +00:00
parent dbbaffdfe9
commit 12acd23cdf
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
5 changed files with 585 additions and 575 deletions

View File

@ -174,7 +174,7 @@
"description_data": [
{
"lang": "eng",
"value": "An information disclosure vulnerability exists in Windows when the Windows SMB Client kernel-mode driver fails to properly handle objects in memory, aka \u0027Windows SMB Client Driver Information Disclosure Vulnerability\u0027."
"value": "An information disclosure vulnerability exists in Windows when the Windows SMB Client kernel-mode driver fails to properly handle objects in memory, aka 'Windows SMB Client Driver Information Disclosure Vulnerability'."
}
]
},
@ -193,7 +193,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1293"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1293",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1293"
}
]
}

View File

@ -105,7 +105,7 @@
"description_data": [
{
"lang": "eng",
"value": "A security feature bypass exists when Windows Secure Boot improperly restricts access to debugging functionality, aka \u0027Windows Secure Boot Security Feature Bypass Vulnerability\u0027."
"value": "A security feature bypass exists when Windows Secure Boot improperly restricts access to debugging functionality, aka 'Windows Secure Boot Security Feature Bypass Vulnerability'."
}
]
},
@ -124,7 +124,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1294"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1294",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1294"
}
]
}

View File

@ -57,7 +57,7 @@
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren\u0027t properly protected from unsafe data input, aka \u0027Microsoft SharePoint Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2019-1257, CVE-2019-1296."
"value": "A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1257, CVE-2019-1296."
}
]
},
@ -76,7 +76,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1295"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1295",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1295"
}
]
}

View File

@ -54,7 +54,7 @@
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren\u0027t properly protected from unsafe data input, aka \u0027Microsoft SharePoint Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2019-1257, CVE-2019-1295."
"value": "A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1257, CVE-2019-1295."
}
]
},
@ -73,7 +73,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1296"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1296",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1296"
}
]
}

View File

@ -84,7 +84,7 @@
"description_data": [
{
"lang": "eng",
"value": "A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka \u0027Microsoft Excel Remote Code Execution Vulnerability\u0027."
"value": "A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'."
}
]
},
@ -103,7 +103,9 @@
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1297"
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1297",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1297"
}
]
}