mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
74 lines
2.1 KiB
JSON
74 lines
2.1 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "secure@microsoft.com",
|
|
"DATE_PUBLIC" : "2017-10-10T00:00:00",
|
|
"ID" : "CVE-2017-11819",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "Microsoft Windows 7 SP1",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "Microsoft Windows 7 SP1"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "Microsoft Corporation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Microsoft Windows 7 SP1 allows an attacker to execute arbitrary code in the context of the current user, due to how Microsoft browsers handle objects in memory, aka \"Windows Shell Remote Code Execution Vulnerability\"."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Remote Code Execution"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11819",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-11819"
|
|
},
|
|
{
|
|
"name" : "101121",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/101121"
|
|
},
|
|
{
|
|
"name" : "1039537",
|
|
"refsource" : "SECTRACK",
|
|
"url" : "http://www.securitytracker.com/id/1039537"
|
|
}
|
|
]
|
|
}
|
|
}
|