March Patch Tuesday Batch 4

This commit is contained in:
MSRC 2019-04-08 15:01:24 -07:00
parent 4df42e7af3
commit fae6b8c06c
11 changed files with 946 additions and 143 deletions

View File

@ -1,18 +1,102 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0756",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0756",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Windows",
"version" : {
"version_data" : [
{"version_value" : "7 for 32-bit Systems Service Pack 1"},
{"version_value" : "7 for x64-based Systems Service Pack 1"},
{"version_value" : "8.1 for 32-bit systems"},
{"version_value" : "8.1 for x64-based systems"},
{"version_value" : "RT 8.1"},
{"version_value" : "10 for 32-bit Systems"},
{"version_value" : "10 for x64-based Systems"},
{"version_value" : "10 Version 1607 for 32-bit Systems"},
{"version_value" : "10 Version 1607 for x64-based Systems"},
{"version_value" : "10 Version 1703 for 32-bit Systems"},
{"version_value" : "10 Version 1703 for x64-based Systems"},
{"version_value" : "10 Version 1709 for 32-bit Systems"},
{"version_value" : "10 Version 1709 for x64-based Systems"},
{"version_value" : "10 Version 1803 for 32-bit Systems"},
{"version_value" : "10 Version 1803 for x64-based Systems"},
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
{"version_value" : "10 Version 1809 for 32-bit Systems"},
{"version_value" : "10 Version 1809 for x64-based Systems"},
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
]
}
}
},
{
"product_name" : "Windows Server",
"version" : {
"version_data" : [
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},
{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"},
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"},
{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"},
{"version_value" : "2012"},
{"version_value" : "2012 (Core installation)"},
{"version_value" : "2012 R2"},
{"version_value" : "2012 R2 (Core installation)"},
{"version_value" : "2016"},
{"version_value" : "2016 (Core installation)"},
{"version_value" : "version 1709 (Core Installation)"},
{"version_value" : "version 1803 (Core Installation)"},
{"version_value" : "2019"},
{"version_value" : "2019 (Core installation)"},
{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"},
{"version_value" : "2008 for 32-bit Systems Service Pack 2"},
{"version_value" : "2008 for x64-based Systems Service Pack 2"},
{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input, aka 'MS XML Remote Code Execution Vulnerability'."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Remote Code Execution"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0756"
}
]
}
}

View File

@ -1,18 +1,92 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0757",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0757",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Microsoft Visual Studio",
"version" : {
"version_data" : [
{"version_value" : "2017 for Mac"}
]
}
}
},
{
"product_name" : ".NET Core SDK",
"version" : {
"version_data" : [
{"version_value" : "1.1 on .NET Core 1.0"},
{"version_value" : "2.1.500 on .NET Core 2.1"},
{"version_value" : "2.2.100 on .NET Core 2.2"},
{"version_value" : "1.1 on .NET Core 1.1"}
]
}
},
{
"product_name" : "Nuget",
"version" : {
"version_data" : [
{"version_value" : "4.3.1"},
{"version_value" : "4.4.2"},
{"version_value" : "4.5.2"},
{"version_value" : "4.6.3"},
{"version_value" : "4.7.2"},
{"version_value" : "4.8.2"},
{"version_value" : "4.9.4"}
]
}
},
{
"product_name" : "Mono Framework",
"version" : {
"version_data" : [
{"version_value" : "5.18.0.223"},
{"version_value" : "5.20.0"}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A tampering vulnerability exists in the NuGet Package Manager for Linux and Mac that could allow an authenticated attacker to modify a NuGet package's folder structure, aka 'NuGet Package Manager Tampering Vulnerability'."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Tampering"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0757"
}
]
}
}

View File

@ -1,18 +1,102 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0759",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0759",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Windows",
"version" : {
"version_data" : [
{"version_value" : "7 for 32-bit Systems Service Pack 1"},
{"version_value" : "7 for x64-based Systems Service Pack 1"},
{"version_value" : "8.1 for 32-bit systems"},
{"version_value" : "8.1 for x64-based systems"},
{"version_value" : "RT 8.1"},
{"version_value" : "10 for 32-bit Systems"},
{"version_value" : "10 for x64-based Systems"},
{"version_value" : "10 Version 1607 for 32-bit Systems"},
{"version_value" : "10 Version 1607 for x64-based Systems"},
{"version_value" : "10 Version 1703 for 32-bit Systems"},
{"version_value" : "10 Version 1703 for x64-based Systems"},
{"version_value" : "10 Version 1709 for 32-bit Systems"},
{"version_value" : "10 Version 1709 for x64-based Systems"},
{"version_value" : "10 Version 1803 for 32-bit Systems"},
{"version_value" : "10 Version 1803 for x64-based Systems"},
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
{"version_value" : "10 Version 1809 for 32-bit Systems"},
{"version_value" : "10 Version 1809 for x64-based Systems"},
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
]
}
}
},
{
"product_name" : "Windows Server",
"version" : {
"version_data" : [
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},
{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"},
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"},
{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"},
{"version_value" : "2012"},
{"version_value" : "2012 (Core installation)"},
{"version_value" : "2012 R2"},
{"version_value" : "2012 R2 (Core installation)"},
{"version_value" : "2016"},
{"version_value" : "2016 (Core installation)"},
{"version_value" : "version 1709 (Core Installation)"},
{"version_value" : "version 1803 (Core Installation)"},
{"version_value" : "2019"},
{"version_value" : "2019 (Core installation)"},
{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"},
{"version_value" : "2008 for 32-bit Systems Service Pack 2"},
{"version_value" : "2008 for x64-based Systems Service Pack 2"},
{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects in memory, aka 'Windows Print Spooler Information Disclosure Vulnerability'."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0759"
}
]
}
}

View File

@ -1,18 +1,89 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0761",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0761",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Internet Explorer 11",
"version" : {
"version_data" : [
{"version_value" : "Windows 7 for 32-bit Systems Service Pack 1"},
{"version_value" : "Windows 7 for x64-based Systems Service Pack 1"},
{"version_value" : "Windows Server 2008 R2 for x64-based Systems Service Pack 1"},
{"version_value" : "Windows 8.1 for 32-bit systems"},
{"version_value" : "Windows 8.1 for x64-based systems"},
{"version_value" : "Windows Server 2012 R2"},
{"version_value" : "Windows RT 8.1"},
{"version_value" : "Windows 10 for 32-bit Systems"},
{"version_value" : "Windows 10 for x64-based Systems"},
{"version_value" : "Windows Server 2016"},
{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1607 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1703 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1709 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1803 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1809 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"},
{"version_value" : "Windows Server 2019"},
{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"}
]
}
}
},
{
"product_name" : "Internet Explorer 10",
"version" : {
"version_data" : [
{"version_value" : "Windows Server 2012"}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A security feature bypass vulnerability exists when Internet Explorer fails to validate the correct Security Zone of requests for specific URLs, aka 'Internet Explorer Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0768."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Security Feature Bypass"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0761"
}
]
}
}

View File

@ -1,18 +1,91 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0762",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0762",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Internet Explorer 11",
"version" : {
"version_data" : [
{"version_value" : "Windows 7 for 32-bit Systems Service Pack 1"},
{"version_value" : "Windows 7 for x64-based Systems Service Pack 1"},
{"version_value" : "Windows Server 2008 R2 for x64-based Systems Service Pack 1"},
{"version_value" : "Windows 8.1 for 32-bit systems"},
{"version_value" : "Windows 8.1 for x64-based systems"},
{"version_value" : "Windows Server 2012 R2"},
{"version_value" : "Windows RT 8.1"},
{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1709 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1803 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1809 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"},
{"version_value" : "Windows Server 2019"},
{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"}
]
}
}
},
{
"product_name" : "Microsoft Edge",
"version" : {
"version_data" : [
{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1709 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1803 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1809 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"},
{"version_value" : "Windows Server 2019"},
{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A security feature bypass vulnerability exists when Microsoft browsers improperly handle requests of different origins, aka 'Microsoft Browsers Security Feature Bypass Vulnerability'."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Security Feature Bypass"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0762"
}
]
}
}

View File

@ -1,18 +1,89 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0763",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0763",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Internet Explorer 11",
"version" : {
"version_data" : [
{"version_value" : "Windows 7 for 32-bit Systems Service Pack 1"},
{"version_value" : "Windows 7 for x64-based Systems Service Pack 1"},
{"version_value" : "Windows Server 2008 R2 for x64-based Systems Service Pack 1"},
{"version_value" : "Windows 8.1 for 32-bit systems"},
{"version_value" : "Windows 8.1 for x64-based systems"},
{"version_value" : "Windows Server 2012 R2"},
{"version_value" : "Windows RT 8.1"},
{"version_value" : "Windows 10 for 32-bit Systems"},
{"version_value" : "Windows 10 for x64-based Systems"},
{"version_value" : "Windows Server 2016"},
{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1607 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1703 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1709 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1803 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1809 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"},
{"version_value" : "Windows Server 2019"},
{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"}
]
}
}
},
{
"product_name" : "Internet Explorer 10",
"version" : {
"version_data" : [
{"version_value" : "Windows Server 2012"}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Remote Code Execution"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0763"
}
]
}
}

View File

@ -1,18 +1,102 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0765",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0765",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Windows",
"version" : {
"version_data" : [
{"version_value" : "7 for 32-bit Systems Service Pack 1"},
{"version_value" : "7 for x64-based Systems Service Pack 1"},
{"version_value" : "8.1 for 32-bit systems"},
{"version_value" : "8.1 for x64-based systems"},
{"version_value" : "RT 8.1"},
{"version_value" : "10 for 32-bit Systems"},
{"version_value" : "10 for x64-based Systems"},
{"version_value" : "10 Version 1607 for 32-bit Systems"},
{"version_value" : "10 Version 1607 for x64-based Systems"},
{"version_value" : "10 Version 1703 for 32-bit Systems"},
{"version_value" : "10 Version 1703 for x64-based Systems"},
{"version_value" : "10 Version 1709 for 32-bit Systems"},
{"version_value" : "10 Version 1709 for x64-based Systems"},
{"version_value" : "10 Version 1803 for 32-bit Systems"},
{"version_value" : "10 Version 1803 for x64-based Systems"},
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
{"version_value" : "10 Version 1809 for 32-bit Systems"},
{"version_value" : "10 Version 1809 for x64-based Systems"},
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
]
}
}
},
{
"product_name" : "Windows Server",
"version" : {
"version_data" : [
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},
{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"},
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"},
{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"},
{"version_value" : "2012"},
{"version_value" : "2012 (Core installation)"},
{"version_value" : "2012 R2"},
{"version_value" : "2012 R2 (Core installation)"},
{"version_value" : "2016"},
{"version_value" : "2016 (Core installation)"},
{"version_value" : "version 1709 (Core Installation)"},
{"version_value" : "version 1803 (Core Installation)"},
{"version_value" : "2019"},
{"version_value" : "2019 (Core installation)"},
{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"},
{"version_value" : "2008 for 32-bit Systems Service Pack 2"},
{"version_value" : "2008 for x64-based Systems Service Pack 2"},
{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A remote code execution vulnerability exists in the way that comctl32.dll handles objects in memory, aka 'Comctl32 Remote Code Execution Vulnerability'."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Remote Code Execution"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0765"
}
]
}
}

View File

@ -1,18 +1,83 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0766",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0766",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Windows Server",
"version" : {
"version_data" : [
{"version_value" : "2016"},
{"version_value" : "2016 (Core installation)"},
{"version_value" : "version 1709 (Core Installation)"},
{"version_value" : "version 1803 (Core Installation)"},
{"version_value" : "2019"},
{"version_value" : "2019 (Core installation)"}
]
}
}
},
{
"product_name" : "Windows",
"version" : {
"version_data" : [
{"version_value" : "10 Version 1607 for 32-bit Systems"},
{"version_value" : "10 Version 1607 for x64-based Systems"},
{"version_value" : "10 Version 1703 for 32-bit Systems"},
{"version_value" : "10 Version 1703 for x64-based Systems"},
{"version_value" : "10 Version 1709 for 32-bit Systems"},
{"version_value" : "10 Version 1709 for x64-based Systems"},
{"version_value" : "10 Version 1803 for 32-bit Systems"},
{"version_value" : "10 Version 1803 for x64-based Systems"},
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
{"version_value" : "10 Version 1809 for 32-bit Systems"},
{"version_value" : "10 Version 1809 for x64-based Systems"},
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An elevation of privilege vulnerability exists in Windows AppX Deployment Server that allows file creation in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Elevation of Privilege Vulnerability'."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Elevation of Privilege"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0766"
}
]
}
}

View File

@ -1,18 +1,102 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0767",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0767",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Windows",
"version" : {
"version_data" : [
{"version_value" : "7 for 32-bit Systems Service Pack 1"},
{"version_value" : "7 for x64-based Systems Service Pack 1"},
{"version_value" : "8.1 for 32-bit systems"},
{"version_value" : "8.1 for x64-based systems"},
{"version_value" : "RT 8.1"},
{"version_value" : "10 for 32-bit Systems"},
{"version_value" : "10 for x64-based Systems"},
{"version_value" : "10 Version 1607 for 32-bit Systems"},
{"version_value" : "10 Version 1607 for x64-based Systems"},
{"version_value" : "10 Version 1703 for 32-bit Systems"},
{"version_value" : "10 Version 1703 for x64-based Systems"},
{"version_value" : "10 Version 1709 for 32-bit Systems"},
{"version_value" : "10 Version 1709 for x64-based Systems"},
{"version_value" : "10 Version 1803 for 32-bit Systems"},
{"version_value" : "10 Version 1803 for x64-based Systems"},
{"version_value" : "10 Version 1803 for ARM64-based Systems"},
{"version_value" : "10 Version 1809 for 32-bit Systems"},
{"version_value" : "10 Version 1809 for x64-based Systems"},
{"version_value" : "10 Version 1809 for ARM64-based Systems"},
{"version_value" : "10 Version 1709 for ARM64-based Systems"}
]
}
}
},
{
"product_name" : "Windows Server",
"version" : {
"version_data" : [
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1 (Core installation)"},
{"version_value" : "2008 R2 for Itanium-Based Systems Service Pack 1"},
{"version_value" : "2008 R2 for x64-based Systems Service Pack 1"},
{"version_value" : "2008 for 32-bit Systems Service Pack 2 (Core installation)"},
{"version_value" : "2012"},
{"version_value" : "2012 (Core installation)"},
{"version_value" : "2012 R2"},
{"version_value" : "2012 R2 (Core installation)"},
{"version_value" : "2016"},
{"version_value" : "2016 (Core installation)"},
{"version_value" : "version 1709 (Core Installation)"},
{"version_value" : "version 1803 (Core Installation)"},
{"version_value" : "2019"},
{"version_value" : "2019 (Core installation)"},
{"version_value" : "2008 for Itanium-Based Systems Service Pack 2"},
{"version_value" : "2008 for 32-bit Systems Service Pack 2"},
{"version_value" : "2008 for x64-based Systems Service Pack 2"},
{"version_value" : "2008 for x64-based Systems Service Pack 2 (Core installation)"}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory.To exploit this vulnerability, an authenticated attacker could run a specially crafted application, aka 'Windows Kernel Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-0702, CVE-2019-0755, CVE-2019-0775, CVE-2019-0782."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Information Disclosure"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0767"
}
]
}
}

View File

@ -1,18 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0768",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0768",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Internet Explorer 11",
"version" : {
"version_data" : [
{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1709 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1803 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1809 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"},
{"version_value" : "Windows Server 2019"},
{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"}
]
}
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A security feature bypass vulnerability exists when Internet Explorer VBScript execution policy does not properly restrict VBScript under specific conditions, and to allow requests that should otherwise be ignored, aka 'Internet Explorer Security Feature Bypass Vulnerability'. This CVE ID is unique from CVE-2019-0761."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Security Feature Bypass"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0768"
}
]
}
}

View File

@ -1,18 +1,82 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-0769",
"STATE": "RESERVED"
"data_type" : "CVE",
"data_format" : "MITRE",
"data_version" : "4.0",
"CVE_data_meta" : {
"ASSIGNER" : "secure@microsoft.com",
"ID" : "CVE-2019-0769",
"STATE" : "PUBLIC"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
"affects" : {
"vendor" : {
"vendor_data" : [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
"product" : {
"product_data" : [
{
"product_name" : "Microsoft Edge",
"version" : {
"version_data" : [
{"version_value" : "Windows 10 for 32-bit Systems"},
{"version_value" : "Windows 10 for x64-based Systems"},
{"version_value" : "Windows Server 2016"},
{"version_value" : "Windows 10 Version 1607 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1607 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1703 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1703 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1709 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1709 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1803 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1803 for ARM64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for 32-bit Systems"},
{"version_value" : "Windows 10 Version 1809 for x64-based Systems"},
{"version_value" : "Windows 10 Version 1809 for ARM64-based Systems"},
{"version_value" : "Windows Server 2019"},
{"version_value" : "Windows 10 Version 1709 for ARM64-based Systems"}
]
}
}
},
{
"product_name" : "ChakraCore",
"version" : {
"version_data" : [
{"version_value" : ""}
]
}
}
]
},
"vendor_name" : "Microsoft"
}
]
}
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-0609, CVE-2019-0639, CVE-2019-0680, CVE-2019-0770, CVE-2019-0771, CVE-2019-0773, CVE-2019-0783."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Remote Code Execution"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0769"
}
]
}
}