diff --git a/2019/0xxx/CVE-2019-0770.json b/2019/0xxx/CVE-2019-0770.json index 3eddfac433c..fe0026114d7 100644 --- a/2019/0xxx/CVE-2019-0770.json +++ b/2019/0xxx/CVE-2019-0770.json @@ -1,18 +1,70 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0770", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0770", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Microsoft Edge", + "version" : { + "version_data" : [ + {"version_value" : "Windows 10 for 32-bit Systems"}, +{"version_value" : "Windows 10 for x64-based Systems"}, +{"version_value" : "Windows Server 2016"}, +{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1607 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1703 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1709 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1803 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"}, +{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"} ] } -} \ No newline at end of file +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Remote Code Execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0770" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0771.json b/2019/0xxx/CVE-2019-0771.json index 2f4b4054c10..47245b4b5e3 100644 --- a/2019/0xxx/CVE-2019-0771.json +++ b/2019/0xxx/CVE-2019-0771.json @@ -1,18 +1,82 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0771", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0771", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Microsoft Edge", + "version" : { + "version_data" : [ + {"version_value" : "Windows 10 for 32-bit Systems"}, +{"version_value" : "Windows 10 for x64-based Systems"}, +{"version_value" : "Windows Server 2016"}, +{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1607 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1703 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1709 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1803 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"}, +{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1809 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"}, +{"version_value" : "Windows Server 2019"}, +{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"} ] } -} \ No newline at end of file +}, +{ +"product_name" : "ChakraCore", + "version" : { + "version_data" : [ + {"version_value" : ""} + ] + } +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0773, CVE-2019-0783." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Remote Code Execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0771" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0772.json b/2019/0xxx/CVE-2019-0772.json index 6ba85d7d553..c16c6ffefe5 100644 --- a/2019/0xxx/CVE-2019-0772.json +++ b/2019/0xxx/CVE-2019-0772.json @@ -1,18 +1,102 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0772", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0772", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Windows", + "version" : { + "version_data" : [ + {"version_value" : "7 for 32-bit Systems Service Pack 1"}, +{"version_value" : "7 for x64-based Systems Service Pack 1"}, +{"version_value" : "8.1 for 32-bit systems"}, +{"version_value" : "8.1 for x64-based systems"}, +{"version_value" : "RT 8.1"}, +{"version_value" : "10 for 32-bit Systems"}, +{"version_value" : "10 for x64-based Systems"}, +{"version_value" : "10 Version 1607 for 32-bit Systems"}, +{"version_value" : "10 Version 1607 for x64-based Systems"}, +{"version_value" : "10 Version 1703 for 32-bit Systems"}, +{"version_value" : "10 Version 1703 for x64-based Systems"}, +{"version_value" : "10 Version 1709 for 32-bit Systems"}, +{"version_value" : "10 Version 1709 for x64-based Systems"}, +{"version_value" : "10 Version 1803 for 32-bit Systems"}, +{"version_value" : "10 Version 1803 for x64-based Systems"}, +{"version_value" : "10 Version 1803 for ARM64-based Systems"}, +{"version_value" : "10 Version 1809 for 32-bit Systems"}, +{"version_value" : "10 Version 1809 for x64-based Systems"}, +{"version_value" : "10 Version 1809 for ARM64-based Systems"}, +{"version_value" : "10 Version 1709 for ARM64-based Systems"} ] } -} \ No newline at end of file +}, +{ +"product_name" : "Windows Server", + "version" : { + "version_data" : [ + {"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"}, +{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"}, +{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"}, +{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"}, +{"version_value" : "2012"}, +{"version_value" : "2012 (Core installation)"}, +{"version_value" : "2012 R2"}, +{"version_value" : "2012 R2 (Core installation)"}, +{"version_value" : "2016"}, +{"version_value" : "2016 (Core installation)"}, +{"version_value" : "version 1709 (Core Installation)"}, +{"version_value" : "version 1803 (Core Installation)"}, +{"version_value" : "2019"}, +{"version_value" : "2019 (Core installation)"}, +{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"}, +{"version_value" : "2008 for 32-bit Systems Service Pack 2"}, +{"version_value" : "2008 for x64-based Systems Service Pack 2"}, +{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"} + ] + } +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'Windows VBScript Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0665, CVE-2019-0666, CVE-2019-0667." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Remote Code Execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0772" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0773.json b/2019/0xxx/CVE-2019-0773.json index fcd3c11ef92..63155bd47e5 100644 --- a/2019/0xxx/CVE-2019-0773.json +++ b/2019/0xxx/CVE-2019-0773.json @@ -1,18 +1,82 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0773", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0773", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Microsoft Edge", + "version" : { + "version_data" : [ + {"version_value" : "Windows 10 for 32-bit Systems"}, +{"version_value" : "Windows 10 for x64-based Systems"}, +{"version_value" : "Windows Server 2016"}, +{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1607 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1703 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1709 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1803 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"}, +{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1809 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"}, +{"version_value" : "Windows Server 2019"}, +{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"} ] } -} \ No newline at end of file +}, +{ +"product_name" : "ChakraCore", + "version" : { + "version_data" : [ + {"version_value" : ""} + ] + } +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0769, CVE-2019-0770, CVE-2019-0771, CVE-2019-0783." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Remote Code Execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0773" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0774.json b/2019/0xxx/CVE-2019-0774.json index b634ee7bb38..cd051fa0197 100644 --- a/2019/0xxx/CVE-2019-0774.json +++ b/2019/0xxx/CVE-2019-0774.json @@ -1,18 +1,102 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0774", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0774", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Windows", + "version" : { + "version_data" : [ + {"version_value" : "7 for 32-bit Systems Service Pack 1"}, +{"version_value" : "7 for x64-based Systems Service Pack 1"}, +{"version_value" : "8.1 for 32-bit systems"}, +{"version_value" : "8.1 for x64-based systems"}, +{"version_value" : "RT 8.1"}, +{"version_value" : "10 for 32-bit Systems"}, +{"version_value" : "10 for x64-based Systems"}, +{"version_value" : "10 Version 1607 for 32-bit Systems"}, +{"version_value" : "10 Version 1607 for x64-based Systems"}, +{"version_value" : "10 Version 1703 for 32-bit Systems"}, +{"version_value" : "10 Version 1703 for x64-based Systems"}, +{"version_value" : "10 Version 1709 for 32-bit Systems"}, +{"version_value" : "10 Version 1709 for x64-based Systems"}, +{"version_value" : "10 Version 1803 for 32-bit Systems"}, +{"version_value" : "10 Version 1803 for x64-based Systems"}, +{"version_value" : "10 Version 1803 for ARM64-based Systems"}, +{"version_value" : "10 Version 1809 for 32-bit Systems"}, +{"version_value" : "10 Version 1809 for x64-based Systems"}, +{"version_value" : "10 Version 1809 for ARM64-based Systems"}, +{"version_value" : "10 Version 1709 for ARM64-based Systems"} ] } -} \ No newline at end of file +}, +{ +"product_name" : "Windows Server", + "version" : { + "version_data" : [ + {"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"}, +{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"}, +{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"}, +{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"}, +{"version_value" : "2012"}, +{"version_value" : "2012 (Core installation)"}, +{"version_value" : "2012 R2"}, +{"version_value" : "2012 R2 (Core installation)"}, +{"version_value" : "2016"}, +{"version_value" : "2016 (Core installation)"}, +{"version_value" : "version 1709 (Core Installation)"}, +{"version_value" : "version 1803 (Core Installation)"}, +{"version_value" : "2019"}, +{"version_value" : "2019 (Core installation)"}, +{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"}, +{"version_value" : "2008 for 32-bit Systems Service Pack 2"}, +{"version_value" : "2008 for x64-based Systems Service Pack 2"}, +{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"} + ] + } +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory, aka 'Windows GDI Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0614." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Information Disclosure" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0774" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0775.json b/2019/0xxx/CVE-2019-0775.json index 2c11f7b0fb7..98834858fed 100644 --- a/2019/0xxx/CVE-2019-0775.json +++ b/2019/0xxx/CVE-2019-0775.json @@ -1,18 +1,102 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0775", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0775", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Windows", + "version" : { + "version_data" : [ + {"version_value" : "7 for 32-bit Systems Service Pack 1"}, +{"version_value" : "7 for x64-based Systems Service Pack 1"}, +{"version_value" : "8.1 for 32-bit systems"}, +{"version_value" : "8.1 for x64-based systems"}, +{"version_value" : "RT 8.1"}, +{"version_value" : "10 for 32-bit Systems"}, +{"version_value" : "10 for x64-based Systems"}, +{"version_value" : "10 Version 1607 for 32-bit Systems"}, +{"version_value" : "10 Version 1607 for x64-based Systems"}, +{"version_value" : "10 Version 1703 for 32-bit Systems"}, +{"version_value" : "10 Version 1703 for x64-based Systems"}, +{"version_value" : "10 Version 1709 for 32-bit Systems"}, +{"version_value" : "10 Version 1709 for x64-based Systems"}, +{"version_value" : "10 Version 1803 for 32-bit Systems"}, +{"version_value" : "10 Version 1803 for x64-based Systems"}, +{"version_value" : "10 Version 1803 for ARM64-based Systems"}, +{"version_value" : "10 Version 1809 for 32-bit Systems"}, +{"version_value" : "10 Version 1809 for x64-based Systems"}, +{"version_value" : "10 Version 1809 for ARM64-based Systems"}, +{"version_value" : "10 Version 1709 for ARM64-based Systems"} ] } -} \ No newline at end of file +}, +{ +"product_name" : "Windows Server", + "version" : { + "version_data" : [ + {"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"}, +{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"}, +{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"}, +{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"}, +{"version_value" : "2012"}, +{"version_value" : "2012 (Core installation)"}, +{"version_value" : "2012 R2"}, +{"version_value" : "2012 R2 (Core installation)"}, +{"version_value" : "2016"}, +{"version_value" : "2016 (Core installation)"}, +{"version_value" : "version 1709 (Core Installation)"}, +{"version_value" : "version 1803 (Core Installation)"}, +{"version_value" : "2019"}, +{"version_value" : "2019 (Core installation)"}, +{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"}, +{"version_value" : "2008 for 32-bit Systems Service Pack 2"}, +{"version_value" : "2008 for x64-based Systems Service Pack 2"}, +{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"} + ] + } +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0702, CVE-2019-0755, CVE-2019-0767, CVE-2019-0782." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Information Disclosure" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0775" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0776.json b/2019/0xxx/CVE-2019-0776.json index 20ef3f95b5b..2378b2914b2 100644 --- a/2019/0xxx/CVE-2019-0776.json +++ b/2019/0xxx/CVE-2019-0776.json @@ -1,18 +1,85 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0776", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0776", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Windows", + "version" : { + "version_data" : [ + {"version_value" : "10 for 32-bit Systems"}, +{"version_value" : "10 for x64-based Systems"}, +{"version_value" : "10 Version 1607 for 32-bit Systems"}, +{"version_value" : "10 Version 1607 for x64-based Systems"}, +{"version_value" : "10 Version 1703 for 32-bit Systems"}, +{"version_value" : "10 Version 1703 for x64-based Systems"}, +{"version_value" : "10 Version 1709 for 32-bit Systems"}, +{"version_value" : "10 Version 1709 for x64-based Systems"}, +{"version_value" : "10 Version 1803 for 32-bit Systems"}, +{"version_value" : "10 Version 1803 for x64-based Systems"}, +{"version_value" : "10 Version 1803 for ARM64-based Systems"}, +{"version_value" : "10 Version 1809 for 32-bit Systems"}, +{"version_value" : "10 Version 1809 for x64-based Systems"}, +{"version_value" : "10 Version 1809 for ARM64-based Systems"}, +{"version_value" : "10 Version 1709 for ARM64-based Systems"} ] } -} \ No newline at end of file +}, +{ +"product_name" : "Windows Server", + "version" : { + "version_data" : [ + {"version_value" : "2016"}, +{"version_value" : "2016 (Core installation)"}, +{"version_value" : "version 1709 (Core Installation)"}, +{"version_value" : "version 1803 (Core Installation)"}, +{"version_value" : "2019"}, +{"version_value" : "2019 (Core installation)"} + ] + } +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An information disclosure vulnerability exists when the win32k component improperly provides kernel information, aka 'Win32k Information Disclosure Vulnerability'." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Information Disclosure" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0776" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0777.json b/2019/0xxx/CVE-2019-0777.json index 602b234174a..a3d4cef36dd 100644 --- a/2019/0xxx/CVE-2019-0777.json +++ b/2019/0xxx/CVE-2019-0777.json @@ -1,18 +1,67 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0777", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0777", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Team Foundation Server 2018", + "version" : { + "version_data" : [ + {"version_value" : "Update 1.2"}, +{"version_value" : "Update 3.2"} ] } -} \ No newline at end of file +}, +{ +"product_name" : "Team Foundation Server", + "version" : { + "version_data" : [ + {"version_value" : "2017 Update 3.1"} + ] + } +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A Cross-site Scripting (XSS) vulnerability exists when Team Foundation Server does not properly sanitize user provided input, aka 'Team Foundation Server Cross-site Scripting Vulnerability'." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Spoofing" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0777" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0778.json b/2019/0xxx/CVE-2019-0778.json index 42e074ef74c..bbf0de3ebcb 100644 --- a/2019/0xxx/CVE-2019-0778.json +++ b/2019/0xxx/CVE-2019-0778.json @@ -1,18 +1,66 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0778", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0778", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Microsoft SharePoint Foundation", + "version" : { + "version_data" : [ + {"version_value" : "2013 Service Pack 1"} ] } -} \ No newline at end of file +}, +{ +"product_name" : "Microsoft SharePoint Enterprise Server", + "version" : { + "version_data" : [ + {"version_value" : "2016"} + ] + } +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server, aka 'Microsoft Office SharePoint XSS Vulnerability'." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Tampering" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0778" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0779.json b/2019/0xxx/CVE-2019-0779.json index ffe4f5e1e0f..30f73483dd0 100644 --- a/2019/0xxx/CVE-2019-0779.json +++ b/2019/0xxx/CVE-2019-0779.json @@ -1,18 +1,65 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0779", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0779", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Microsoft Edge", + "version" : { + "version_data" : [ + {"version_value" : "Windows Server 2016"}, +{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1607 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1703 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1709 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"} ] } -} \ No newline at end of file +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka 'Microsoft Edge Memory Corruption Vulnerability'." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Information Disclosure" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0779" + } + ] + } +} diff --git a/2019/0xxx/CVE-2019-0780.json b/2019/0xxx/CVE-2019-0780.json index 035ee493aef..a18de1612c7 100644 --- a/2019/0xxx/CVE-2019-0780.json +++ b/2019/0xxx/CVE-2019-0780.json @@ -1,18 +1,113 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0780", - "STATE": "RESERVED" + "data_type" : "CVE", + "data_format" : "MITRE", + "data_version" : "4.0", + "CVE_data_meta" : { + "ASSIGNER" : "secure@microsoft.com", + "ID" : "CVE-2019-0780", + "STATE" : "PUBLIC" }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "product" : { + "product_data" : [ + { +"product_name" : "Internet Explorer 11", + "version" : { + "version_data" : [ + {"version_value" : "Windows 7 for 32-bit Systems Service Pack 1"}, +{"version_value" : "Windows 7 for x64-based Systems Service Pack 1"}, +{"version_value" : "Windows Server 2008 R2 for x64-based Systems Service Pack 1"}, +{"version_value" : "Windows 8.1 for 32-bit systems"}, +{"version_value" : "Windows 8.1 for x64-based systems"}, +{"version_value" : "Windows Server 2012 R2"}, +{"version_value" : "Windows RT 8.1"}, +{"version_value" : "Windows 10 for 32-bit Systems"}, +{"version_value" : "Windows 10 for x64-based Systems"}, +{"version_value" : "Windows Server 2016"}, +{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1607 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1703 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1709 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1803 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"}, +{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1809 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"}, +{"version_value" : "Windows Server 2019"}, +{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"} ] } -} \ No newline at end of file +}, +{ +"product_name" : "Internet Explorer 10", + "version" : { + "version_data" : [ + {"version_value" : "Windows Server 2012"} + ] + } +}, +{ +"product_name" : "Microsoft Edge", + "version" : { + "version_data" : [ + {"version_value" : "Windows 10 for 32-bit Systems"}, +{"version_value" : "Windows 10 for x64-based Systems"}, +{"version_value" : "Windows Server 2016"}, +{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1607 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1703 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1709 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1803 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"}, +{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"}, +{"version_value" : "Windows 10 Version 1809 for x64-based Systems"}, +{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"}, +{"version_value" : "Windows Server 2019"}, +{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"} + ] + } +} + ] + }, + "vendor_name" : "Microsoft" + } + ] + } + }, + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory, aka 'Microsoft Browser Memory Corruption Vulnerability'." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Remote Code Execution" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0780" + } + ] + } +}