mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-12 02:05:39 +00:00
Merge pull request #1835 from msrcgit/msrc/march3
March patch tuesday batch 3
This commit is contained in:
commit
f9d903ee62
@ -1,18 +1,73 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0697",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0697",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Windows",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Windows Server",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "version 1803 (Core Installation)"},
|
||||
{"version_value" : "2019"},
|
||||
{"version_value" : "2019 (Core installation)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client, aka 'Windows DHCP Client Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0698, CVE-2019-0726."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Remote Code Execution"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0697"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,73 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0698",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0698",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Windows",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Windows Server",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "version 1803 (Core Installation)"},
|
||||
{"version_value" : "2019"},
|
||||
{"version_value" : "2019 (Core installation)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client, aka 'Windows DHCP Client Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0697, CVE-2019-0726."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Remote Code Execution"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0698"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,69 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0701",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0701",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Windows",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for x64-based Systems"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Windows Server",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "version 1803 (Core Installation)"},
|
||||
{"version_value" : "2019"},
|
||||
{"version_value" : "2019 (Core installation)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system, aka 'Windows Hyper-V Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0690, CVE-2019-0695."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Denial of Service"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0701"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,102 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0702",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0702",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Windows",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "7 for 32-bit Systems Service Pack 1"},
|
||||
{"version_value" : "7 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "8.1 for 32-bit systems"},
|
||||
{"version_value" : "8.1 for x64-based systems"},
|
||||
{"version_value" : "RT 8.1"},
|
||||
{"version_value" : "10 for 32-bit Systems"},
|
||||
{"version_value" : "10 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1607 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1607 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1703 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1703 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1709 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Windows Server",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},
|
||||
{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"},
|
||||
{"version_value" : "2012"},
|
||||
{"version_value" : "2012 (Core installation)"},
|
||||
{"version_value" : "2012 R2"},
|
||||
{"version_value" : "2012 R2 (Core installation)"},
|
||||
{"version_value" : "2016"},
|
||||
{"version_value" : "2016 (Core installation)"},
|
||||
{"version_value" : "version 1709 (Core Installation)"},
|
||||
{"version_value" : "version 1803 (Core Installation)"},
|
||||
{"version_value" : "2019"},
|
||||
{"version_value" : "2019 (Core installation)"},
|
||||
{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0755, CVE-2019-0767, CVE-2019-0775, CVE-2019-0782."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0702"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,102 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0703",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0703",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Windows",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "7 for 32-bit Systems Service Pack 1"},
|
||||
{"version_value" : "7 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "8.1 for 32-bit systems"},
|
||||
{"version_value" : "8.1 for x64-based systems"},
|
||||
{"version_value" : "RT 8.1"},
|
||||
{"version_value" : "10 for 32-bit Systems"},
|
||||
{"version_value" : "10 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1607 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1607 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1703 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1703 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1709 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Windows Server",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},
|
||||
{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"},
|
||||
{"version_value" : "2012"},
|
||||
{"version_value" : "2012 (Core installation)"},
|
||||
{"version_value" : "2012 R2"},
|
||||
{"version_value" : "2012 R2 (Core installation)"},
|
||||
{"version_value" : "2016"},
|
||||
{"version_value" : "2016 (Core installation)"},
|
||||
{"version_value" : "version 1709 (Core Installation)"},
|
||||
{"version_value" : "version 1803 (Core Installation)"},
|
||||
{"version_value" : "2019"},
|
||||
{"version_value" : "2019 (Core installation)"},
|
||||
{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0704, CVE-2019-0821."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0703"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,102 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0704",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0704",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Windows",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "7 for 32-bit Systems Service Pack 1"},
|
||||
{"version_value" : "7 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "8.1 for 32-bit systems"},
|
||||
{"version_value" : "8.1 for x64-based systems"},
|
||||
{"version_value" : "RT 8.1"},
|
||||
{"version_value" : "10 for 32-bit Systems"},
|
||||
{"version_value" : "10 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1607 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1607 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1703 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1703 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1709 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Windows Server",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},
|
||||
{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"},
|
||||
{"version_value" : "2012"},
|
||||
{"version_value" : "2012 (Core installation)"},
|
||||
{"version_value" : "2012 R2"},
|
||||
{"version_value" : "2012 R2 (Core installation)"},
|
||||
{"version_value" : "2016"},
|
||||
{"version_value" : "2016 (Core installation)"},
|
||||
{"version_value" : "version 1709 (Core Installation)"},
|
||||
{"version_value" : "version 1803 (Core Installation)"},
|
||||
{"version_value" : "2019"},
|
||||
{"version_value" : "2019 (Core installation)"},
|
||||
{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests, aka 'Windows SMB Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0703, CVE-2019-0821."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0704"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,73 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0726",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0726",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Windows",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Windows Server",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "version 1803 (Core Installation)"},
|
||||
{"version_value" : "2019"},
|
||||
{"version_value" : "2019 (Core installation)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client, aka 'Windows DHCP Client Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0697, CVE-2019-0698."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Remote Code Execution"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0726"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,130 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0746",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0746",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Internet Explorer 9",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "Windows Server 2008 for 32-bit Systems Service Pack 2"},
|
||||
{"version_value" : "Windows Server 2008 for x64-based Systems Service Pack 2"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Internet Explorer 11",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "Windows 7 for 32-bit Systems Service Pack 1"},
|
||||
{"version_value" : "Windows 7 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "Windows Server 2008 R2 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "Windows 8.1 for 32-bit systems"},
|
||||
{"version_value" : "Windows 8.1 for x64-based systems"},
|
||||
{"version_value" : "Windows Server 2012 R2"},
|
||||
{"version_value" : "Windows RT 8.1"},
|
||||
{"version_value" : "Windows 10 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 for x64-based Systems"},
|
||||
{"version_value" : "Windows Server 2016"},
|
||||
{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1607 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1703 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1709 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"},
|
||||
{"version_value" : "Windows Server 2019"},
|
||||
{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Internet Explorer 10",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "Windows Server 2012"}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Microsoft Edge",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "Windows 10 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 for x64-based Systems"},
|
||||
{"version_value" : "Windows Server 2016"},
|
||||
{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1607 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1703 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1709 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "Windows 10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"},
|
||||
{"version_value" : "Windows Server 2019"},
|
||||
{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "ChakraCore",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : ""}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "An information disclosure vulnerability exists when the scripting engine does not properly handle objects in memory in Microsoft Edge, aka 'Scripting Engine Information Disclosure Vulnerability'."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0746"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,59 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0748",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0748",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Microsoft Office",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "2010 Service Pack 2 (32-bit editions)"},
|
||||
{"version_value" : "2010 Service Pack 2 (64-bit editions)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Remote Code Execution"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0748"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,102 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0754",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0754",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Windows",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "7 for 32-bit Systems Service Pack 1"},
|
||||
{"version_value" : "7 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "8.1 for 32-bit systems"},
|
||||
{"version_value" : "8.1 for x64-based systems"},
|
||||
{"version_value" : "RT 8.1"},
|
||||
{"version_value" : "10 for 32-bit Systems"},
|
||||
{"version_value" : "10 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1607 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1607 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1703 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1703 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1709 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Windows Server",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},
|
||||
{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"},
|
||||
{"version_value" : "2012"},
|
||||
{"version_value" : "2012 (Core installation)"},
|
||||
{"version_value" : "2012 R2"},
|
||||
{"version_value" : "2012 R2 (Core installation)"},
|
||||
{"version_value" : "2016"},
|
||||
{"version_value" : "2016 (Core installation)"},
|
||||
{"version_value" : "version 1709 (Core Installation)"},
|
||||
{"version_value" : "version 1803 (Core Installation)"},
|
||||
{"version_value" : "2019"},
|
||||
{"version_value" : "2019 (Core installation)"},
|
||||
{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "A denial of service vulnerability exists when Windows improperly handles objects in memory, aka 'Windows Denial of Service Vulnerability'."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Denial of Service"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0754"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
@ -1,18 +1,102 @@
|
||||
{
|
||||
"CVE_data_meta": {
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"ID": "CVE-2019-0755",
|
||||
"STATE": "RESERVED"
|
||||
"data_type" : "CVE",
|
||||
"data_format" : "MITRE",
|
||||
"data_version" : "4.0",
|
||||
"CVE_data_meta" : {
|
||||
"ASSIGNER" : "secure@microsoft.com",
|
||||
"ID" : "CVE-2019-0755",
|
||||
"STATE" : "PUBLIC"
|
||||
},
|
||||
"data_format": "MITRE",
|
||||
"data_type": "CVE",
|
||||
"data_version": "4.0",
|
||||
"description": {
|
||||
"description_data": [
|
||||
"affects" : {
|
||||
"vendor" : {
|
||||
"vendor_data" : [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
}
|
||||
"product" : {
|
||||
"product_data" : [
|
||||
{
|
||||
"product_name" : "Windows",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "7 for 32-bit Systems Service Pack 1"},
|
||||
{"version_value" : "7 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "8.1 for 32-bit systems"},
|
||||
{"version_value" : "8.1 for x64-based systems"},
|
||||
{"version_value" : "RT 8.1"},
|
||||
{"version_value" : "10 for 32-bit Systems"},
|
||||
{"version_value" : "10 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1607 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1607 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1703 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1703 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1709 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1803 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for 32-bit Systems"},
|
||||
{"version_value" : "10 Version 1809 for x64-based Systems"},
|
||||
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
|
||||
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
|
||||
]
|
||||
}
|
||||
}
|
||||
},
|
||||
{
|
||||
"product_name" : "Windows Server",
|
||||
"version" : {
|
||||
"version_data" : [
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},
|
||||
{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"},
|
||||
{"version_value" : "2012"},
|
||||
{"version_value" : "2012 (Core installation)"},
|
||||
{"version_value" : "2012 R2"},
|
||||
{"version_value" : "2012 R2 (Core installation)"},
|
||||
{"version_value" : "2016"},
|
||||
{"version_value" : "2016 (Core installation)"},
|
||||
{"version_value" : "version 1709 (Core Installation)"},
|
||||
{"version_value" : "version 1803 (Core Installation)"},
|
||||
{"version_value" : "2019"},
|
||||
{"version_value" : "2019 (Core installation)"},
|
||||
{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for 32-bit Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2"},
|
||||
{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"vendor_name" : "Microsoft"
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"description" : {
|
||||
"description_data" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0702, CVE-2019-0767, CVE-2019-0775, CVE-2019-0782."
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype" : {
|
||||
"problemtype_data" : [
|
||||
{
|
||||
"description" : [
|
||||
{
|
||||
"lang" : "eng",
|
||||
"value" : "Information Disclosure"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"references" : {
|
||||
"reference_data" : [
|
||||
{
|
||||
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0755"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user