mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
- Synchronized data.
This commit is contained in:
parent
876a67d27f
commit
814a9d1e8b
@ -1,10 +1,10 @@
|
||||
{
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "kurt@seifried.org",
|
||||
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
|
||||
"DATE_ASSIGNED" : "2017-11-20",
|
||||
"ID" : "CVE-2017-1000385",
|
||||
"REQUESTER" : "hanno@hboeck.de",
|
||||
"STATE" : "PUBLIC",
|
||||
"DATE_ASSIGNED" : "2017-11-20"
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
@ -62,6 +62,12 @@
|
||||
},
|
||||
{
|
||||
"url" : "http://erlang.org/pipermail/erlang-questions/2017-November/094255.html"
|
||||
},
|
||||
{
|
||||
"url" : "https://robotattack.org/"
|
||||
},
|
||||
{
|
||||
"url" : "https://www.kb.cert.org/vuls/id/144389"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -35,7 +35,7 @@
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Microsoft Office 2016 Click-to-Run (C2R) allows a remote code excecution vulnerability due to the way files are handled in memory, aka \"Microsoft Excel Remote Code Execution Vulnerability\"."
|
||||
"value" : "Microsoft Office 2016 Click-to-Run (C2R) allows a remote code execution vulnerability due to the way files are handled in memory, aka \"Microsoft Excel Remote Code Execution Vulnerability\"."
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11937"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102070"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039972"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -35,7 +35,7 @@
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, 1709 and Windows Server 2016, Windows Server, version 1709, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to remote code execution. aka \"Microsoft Malware Protection Engine Remote Code Execution Vulnerability\". This is different than CVE-2017-11937"
|
||||
"value" : "The Microsoft Malware Protection Engine running on Microsoft Forefront and Microsoft Defender on Windows 7 SP1, Windows 8.1, Windows RT 8.1, Windows 10 Gold, 1511, 1607, and 1703, 1709 and Windows Server 2016, Windows Server, version 1709, Microsoft Exchange Server 2013 and 2016, does not properly scan a specially crafted file leading to remote code execution. aka \"Microsoft Malware Protection Engine Remote Code Execution Vulnerability\". This is different than CVE-2017-11937."
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -55,6 +55,12 @@
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11940"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securityfocus.com/bid/102104"
|
||||
},
|
||||
{
|
||||
"url" : "http://www.securitytracker.com/id/1039972"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user