"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-12-10 22:01:09 +00:00
parent 8595c3c8cd
commit 18410e11ed
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
69 changed files with 4836 additions and 4581 deletions

View File

@ -103,6 +103,11 @@
"refsource": "MLIST", "refsource": "MLIST",
"name": "[oss-security] 20191210 CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)", "name": "[oss-security] 20191210 CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
"url": "http://www.openwall.com/lists/oss-security/2019/12/10/3" "url": "http://www.openwall.com/lists/oss-security/2019/12/10/3"
},
{
"refsource": "MLIST",
"name": "[oss-security] 20191210 Re: CVE-2019-19338 Kernel: KVM: export MSR_IA32_TSX_CTRL to guest - incomplete fix for TAA (CVE-2019-11135)",
"url": "http://www.openwall.com/lists/oss-security/2019/12/10/4"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13725", "ID": "CVE-2019-13725",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1025067" "url": "https://crbug.com/1025067",
"refsource": "MISC",
"name": "https://crbug.com/1025067"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13726", "ID": "CVE-2019-13726",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1027152" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1027152",
"refsource": "MISC",
"name": "https://crbug.com/1027152"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13727", "ID": "CVE-2019-13727",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/944619" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/944619",
"refsource": "MISC",
"name": "https://crbug.com/944619"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13728", "ID": "CVE-2019-13728",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1024758" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1024758",
"refsource": "MISC",
"name": "https://crbug.com/1024758"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13729", "ID": "CVE-2019-13729",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1025489" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1025489",
"refsource": "MISC",
"name": "https://crbug.com/1025489"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13730", "ID": "CVE-2019-13730",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1028862" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1028862",
"refsource": "MISC",
"name": "https://crbug.com/1028862"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13732", "ID": "CVE-2019-13732",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1023817" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1023817",
"refsource": "MISC",
"name": "https://crbug.com/1023817"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13734", "ID": "CVE-2019-13734",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1025466" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1025466",
"refsource": "MISC",
"name": "https://crbug.com/1025466"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13735", "ID": "CVE-2019-13735",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1025468" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1025468",
"refsource": "MISC",
"name": "https://crbug.com/1025468"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13736", "ID": "CVE-2019-13736",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1020899" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1020899",
"refsource": "MISC",
"name": "https://crbug.com/1020899"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13737", "ID": "CVE-2019-13737",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1013882" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1013882",
"refsource": "MISC",
"name": "https://crbug.com/1013882"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13738", "ID": "CVE-2019-13738",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1017441" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1017441",
"refsource": "MISC",
"name": "https://crbug.com/1017441"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13739", "ID": "CVE-2019-13739",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/824715" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/824715",
"refsource": "MISC",
"name": "https://crbug.com/824715"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13740", "ID": "CVE-2019-13740",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1005596" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1005596",
"refsource": "MISC",
"name": "https://crbug.com/1005596"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13741", "ID": "CVE-2019-13741",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1011950" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1011950",
"refsource": "MISC",
"name": "https://crbug.com/1011950"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13742", "ID": "CVE-2019-13742",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1017564" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1017564",
"refsource": "MISC",
"name": "https://crbug.com/1017564"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13743", "ID": "CVE-2019-13743",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/754304" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/754304",
"refsource": "MISC",
"name": "https://crbug.com/754304"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13744", "ID": "CVE-2019-13744",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/853670" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/853670",
"refsource": "MISC",
"name": "https://crbug.com/853670"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13745", "ID": "CVE-2019-13745",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/990867" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/990867",
"refsource": "MISC",
"name": "https://crbug.com/990867"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13746", "ID": "CVE-2019-13746",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/999932" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/999932",
"refsource": "MISC",
"name": "https://crbug.com/999932"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13747", "ID": "CVE-2019-13747",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1018528" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1018528",
"refsource": "MISC",
"name": "https://crbug.com/1018528"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13748", "ID": "CVE-2019-13748",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/993706" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/993706",
"refsource": "MISC",
"name": "https://crbug.com/993706"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13749", "ID": "CVE-2019-13749",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1010765" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1010765",
"refsource": "MISC",
"name": "https://crbug.com/1010765"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13750", "ID": "CVE-2019-13750",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1025464" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1025464",
"refsource": "MISC",
"name": "https://crbug.com/1025464"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13751", "ID": "CVE-2019-13751",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1025465" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1025465",
"refsource": "MISC",
"name": "https://crbug.com/1025465"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13752", "ID": "CVE-2019-13752",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1025470" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1025470",
"refsource": "MISC",
"name": "https://crbug.com/1025470"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13753", "ID": "CVE-2019-13753",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1025471" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1025471",
"refsource": "MISC",
"name": "https://crbug.com/1025471"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13754", "ID": "CVE-2019-13754",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/442579" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/442579",
"refsource": "MISC",
"name": "https://crbug.com/442579"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13755", "ID": "CVE-2019-13755",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/696208" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/696208",
"refsource": "MISC",
"name": "https://crbug.com/696208"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13756", "ID": "CVE-2019-13756",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/708595" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/708595",
"refsource": "MISC",
"name": "https://crbug.com/708595"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13757", "ID": "CVE-2019-13757",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/884693" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/884693",
"refsource": "MISC",
"name": "https://crbug.com/884693"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13758", "ID": "CVE-2019-13758",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/979441" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/979441",
"refsource": "MISC",
"name": "https://crbug.com/979441"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13759", "ID": "CVE-2019-13759",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/901789" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/901789",
"refsource": "MISC",
"name": "https://crbug.com/901789"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13761", "ID": "CVE-2019-13761",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1002687" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1002687",
"refsource": "MISC",
"name": "https://crbug.com/1002687"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13762", "ID": "CVE-2019-13762",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1004212" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1004212",
"refsource": "MISC",
"name": "https://crbug.com/1004212"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13763", "ID": "CVE-2019-13763",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1011600" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1011600",
"refsource": "MISC",
"name": "https://crbug.com/1011600"
} }
] ]
}, },

View File

@ -4,7 +4,8 @@
"data_version": "4.0", "data_version": "4.0",
"CVE_data_meta": { "CVE_data_meta": {
"ID": "CVE-2019-13764", "ID": "CVE-2019-13764",
"ASSIGNER": "chrome-cve-admin@google.com" "ASSIGNER": "security@google.com",
"STATE": "PUBLIC"
}, },
"affects": { "affects": {
"vendor": { "vendor": {
@ -45,10 +46,14 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://crbug.com/1028863" "url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html",
"refsource": "MISC",
"name": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html"
}, },
{ {
"url": "https://chromereleases.googleblog.com/2019/12/stable-channel-update-for-desktop.html" "url": "https://crbug.com/1028863",
"refsource": "MISC",
"name": "https://crbug.com/1028863"
} }
] ]
}, },

View File

@ -54,7 +54,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A cross-site scripting (XSS) vulnerability exists when Microsoft SQL Server Reporting Services (SSRS) does not properly sanitize a specially-crafted web request to an affected SSRS server, aka \u0027Microsoft SQL Server Reporting Services XSS Vulnerability\u0027." "value": "A cross-site scripting (XSS) vulnerability exists when Microsoft SQL Server Reporting Services (SSRS) does not properly sanitize a specially-crafted web request to an affected SSRS server, aka 'Microsoft SQL Server Reporting Services XSS Vulnerability'."
} }
] ]
}, },
@ -73,7 +73,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1332" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1332",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1332"
} }
] ]
} }

View File

@ -71,7 +71,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka \u0027Microsoft Access Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1463." "value": "An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1463."
} }
] ]
}, },
@ -90,7 +90,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1400" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1400",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1400"
} }
] ]
} }

View File

@ -208,7 +208,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability\u0027." "value": "A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests, aka 'Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability'."
} }
] ]
}, },
@ -227,7 +227,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1453" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1453",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1453"
} }
] ]
} }

View File

@ -107,7 +107,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka \u0027Win32k Elevation of Privilege Vulnerability\u0027." "value": "An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'."
} }
] ]
}, },
@ -126,7 +126,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1458"
} }
] ]
} }

View File

@ -84,7 +84,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A denial of service vulnerability exists in Microsoft Word software when the software fails to properly handle objects in memory, aka \u0027Microsoft Word Denial of Service Vulnerability\u0027." "value": "A denial of service vulnerability exists in Microsoft Word software when the software fails to properly handle objects in memory, aka 'Microsoft Word Denial of Service Vulnerability'."
} }
] ]
}, },
@ -103,7 +103,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1461" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1461",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1461"
} }
] ]
} }

View File

@ -84,7 +84,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka \u0027Microsoft PowerPoint Remote Code Execution Vulnerability\u0027." "value": "A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka 'Microsoft PowerPoint Remote Code Execution Vulnerability'."
} }
] ]
}, },
@ -103,7 +103,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1462" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1462",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1462"
} }
] ]
} }

View File

@ -71,7 +71,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka \u0027Microsoft Access Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1400." "value": "An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1400."
} }
] ]
}, },
@ -90,7 +90,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1463" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1463",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1463"
} }
] ]
} }

View File

@ -105,7 +105,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka \u0027Microsoft Excel Information Disclosure Vulnerability\u0027." "value": "An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka 'Microsoft Excel Information Disclosure Vulnerability'."
} }
] ]
}, },
@ -124,7 +124,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1464" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1464",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1464"
} }
] ]
} }

View File

@ -223,7 +223,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka \u0027Windows GDI Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1466, CVE-2019-1467." "value": "An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1466, CVE-2019-1467."
} }
] ]
}, },
@ -242,7 +242,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1465" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1465",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1465"
} }
] ]
} }

View File

@ -223,7 +223,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka \u0027Windows GDI Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1465, CVE-2019-1467." "value": "An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1465, CVE-2019-1467."
} }
] ]
}, },
@ -242,7 +242,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1466" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1466",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1466"
} }
] ]
} }

View File

@ -223,7 +223,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka \u0027Windows GDI Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1465, CVE-2019-1466." "value": "An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1465, CVE-2019-1466."
} }
] ]
}, },
@ -242,7 +242,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1467" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1467",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1467"
} }
] ]
} }

View File

@ -223,7 +223,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka \u0027Win32k Graphics Remote Code Execution Vulnerability\u0027." "value": "A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Win32k Graphics Remote Code Execution Vulnerability'."
} }
] ]
}, },
@ -242,7 +242,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1468" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1468",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1468"
} }
] ]
} }

View File

@ -223,7 +223,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka \u0027Win32k Information Disclosure Vulnerability\u0027." "value": "An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'."
} }
] ]
}, },
@ -242,7 +242,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1469" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1469",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1469"
} }
] ]
} }

View File

@ -138,7 +138,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system, aka \u0027Windows Hyper-V Information Disclosure Vulnerability\u0027." "value": "An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Information Disclosure Vulnerability'."
} }
] ]
}, },
@ -157,7 +157,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1470" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1470",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1470"
} }
] ]
} }

View File

@ -93,7 +93,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka \u0027Windows Hyper-V Remote Code Execution Vulnerability\u0027." "value": "A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system, aka 'Windows Hyper-V Remote Code Execution Vulnerability'."
} }
] ]
}, },
@ -112,7 +112,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1471" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1471",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1471"
} }
] ]
} }

View File

@ -172,7 +172,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka \u0027Windows Kernel Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1474." "value": "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1474."
} }
] ]
}, },
@ -191,7 +191,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1472" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1472",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1472"
} }
] ]
} }

View File

@ -223,7 +223,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka \u0027Windows Kernel Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1472." "value": "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1472."
} }
] ]
}, },
@ -242,7 +242,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1474" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1474",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1474"
} }
] ]
} }

View File

@ -163,7 +163,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka \u0027Windows Elevation of Privilege Vulnerability\u0027. This CVE ID is unique from CVE-2019-1483." "value": "An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1483."
} }
] ]
}, },
@ -182,7 +182,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1476" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1476",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1476"
} }
] ]
} }

View File

@ -53,7 +53,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers, aka \u0027Windows Printer Service Elevation of Privilege Vulnerability\u0027." "value": "An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers, aka 'Windows Printer Service Elevation of Privilege Vulnerability'."
} }
] ]
}, },
@ -72,7 +72,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1477" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1477",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1477"
} }
] ]
} }

View File

@ -68,7 +68,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An elevation of privilege vulnerability exists when Windows improperly handles COM object creation, aka \u0027Windows COM Server Elevation of Privilege Vulnerability\u0027." "value": "An elevation of privilege vulnerability exists when Windows improperly handles COM object creation, aka 'Windows COM Server Elevation of Privilege Vulnerability'."
} }
] ]
}, },
@ -87,7 +87,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1478" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1478",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1478"
} }
] ]
} }

View File

@ -37,7 +37,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory, aka \u0027Windows Media Player Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1481." "value": "An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory, aka 'Windows Media Player Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1481."
} }
] ]
}, },
@ -56,7 +56,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1480" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1480",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1480"
} }
] ]
} }

View File

@ -37,7 +37,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory, aka \u0027Windows Media Player Information Disclosure Vulnerability\u0027. This CVE ID is unique from CVE-2019-1480." "value": "An information disclosure vulnerability exists in Windows Media Player when it fails to properly handle objects in memory, aka 'Windows Media Player Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1480."
} }
] ]
}, },
@ -56,7 +56,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1481" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1481",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1481"
} }
] ]
} }

View File

@ -154,7 +154,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka \u0027Windows Elevation of Privilege Vulnerability\u0027. This CVE ID is unique from CVE-2019-1476." "value": "An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions.To exploit this vulnerability, an attacker would first have to gain execution on the victim system, aka 'Windows Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1476."
} }
] ]
}, },
@ -173,7 +173,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1483" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1483",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1483"
} }
] ]
} }

View File

@ -223,7 +223,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka \u0027Windows OLE Remote Code Execution Vulnerability\u0027." "value": "A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input, aka 'Windows OLE Remote Code Execution Vulnerability'."
} }
] ]
}, },
@ -242,7 +242,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1484" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1484",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1484"
} }
] ]
} }

View File

@ -190,7 +190,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka \u0027VBScript Remote Code Execution Vulnerability\u0027." "value": "A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'."
} }
] ]
}, },
@ -209,7 +209,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1485" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1485",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1485"
} }
] ]
} }

View File

@ -54,7 +54,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A spoofing vulnerability exists in Visual Studio Live Share when a guest connected to a Live Share session is redirected to an arbitrary URL specified by the session host, aka \u0027Visual Studio Live Share Spoofing Vulnerability\u0027." "value": "A spoofing vulnerability exists in Visual Studio Live Share when a guest connected to a Live Share session is redirected to an arbitrary URL specified by the session host, aka 'Visual Studio Live Share Spoofing Vulnerability'."
} }
] ]
}, },
@ -73,7 +73,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1486" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1486",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1486"
} }
] ]
} }

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability in Android Apps using Microsoft Authentication Library (MSAL) 0.3.1-Alpha or later exists under specific conditions, aka \u0027Microsoft Authentication Library for Android Information Disclosure Vulnerability\u0027." "value": "An information disclosure vulnerability in Android Apps using Microsoft Authentication Library (MSAL) 0.3.1-Alpha or later exists under specific conditions, aka 'Microsoft Authentication Library for Android Information Disclosure Vulnerability'."
} }
] ]
}, },
@ -53,7 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1487" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1487",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1487"
} }
] ]
} }

View File

@ -223,7 +223,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A security feature bypass vulnerability exists when Microsoft Defender improperly handles specific buffers, aka \u0027Microsoft Defender Security Feature Bypass Vulnerability\u0027." "value": "A security feature bypass vulnerability exists when Microsoft Defender improperly handles specific buffers, aka 'Microsoft Defender Security Feature Bypass Vulnerability'."
} }
] ]
}, },
@ -242,7 +242,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1488" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1488",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1488"
} }
] ]
} }

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "An information disclosure vulnerability exists when the Windows Remote Desktop Protocol (RDP) fails to properly handle objects in memory, aka \u0027Remote Desktop Protocol Information Disclosure Vulnerability\u0027." "value": "An information disclosure vulnerability exists when the Windows Remote Desktop Protocol (RDP) fails to properly handle objects in memory, aka 'Remote Desktop Protocol Information Disclosure Vulnerability'."
} }
] ]
}, },
@ -53,7 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1489" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1489",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1489"
} }
] ]
} }

View File

@ -34,7 +34,7 @@
"description_data": [ "description_data": [
{ {
"lang": "eng", "lang": "eng",
"value": "A spoofing vulnerability exists when a Skype for Business Server does not properly sanitize a specially crafted request, aka \u0027Skype for Business Server Spoofing Vulnerability\u0027." "value": "A spoofing vulnerability exists when a Skype for Business Server does not properly sanitize a specially crafted request, aka 'Skype for Business Server Spoofing Vulnerability'."
} }
] ]
}, },
@ -53,7 +53,9 @@
"references": { "references": {
"reference_data": [ "reference_data": [
{ {
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1490" "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1490",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1490"
} }
] ]
} }

View File

@ -84,6 +84,11 @@
"name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98", "name": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98",
"refsource": "CONFIRM", "refsource": "CONFIRM",
"url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98" "url": "https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=f1c5eea8a817075d31e43f5876993c6710238c98"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20191210-0001/",
"url": "https://security.netapp.com/advisory/ntap-20191210-0001/"
} }
] ]
} }