LanGuard reports



Supported OVAL Bulletins


More information on 2024 updates



ID:
CISEC:6767
Title:
Windows User Profile Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6767
CVE-2019-1454
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete files or folders of their choosing. The security update addresses the vulnerability by correcting how the Windows User Profile Service handles symlinks.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6770
Title:
Windows UPnP Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6770
CVE-2019-1405
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly allows COM object creation. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows UPnP service accesses COM objects.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6778
Title:
Windows TCP/IP Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6778
CVE-2019-1324
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles IPv6 flowlabel filled in packets. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to send specially crafted IPv6 packets to a remote Windows computer. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows handles IPv6 flowlabel data in packets.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6788
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6788
CVE-2019-1416
Severity:
Medium
Description:
An elevation of privilege vulnerability exists due to a race condition in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6780
Title:
Windows Remote Procedure Call Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6780
CVE-2019-1409
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Remote Procedure Call (RPC) runtime improperly initializes objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. The update addresses the vulnerability by correcting how the Remote Procedure Call runtime initializes objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6781
Title:
Windows Modules Installer Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6781
CVE-2019-1418
Severity:
Low
Description:
An information vulnerability exists when Windows Modules Installer Service improperly discloses file information. Successful exploitation of the vulnerability could allow the attacker to read the contents of a log file on disk. To exploit the vulnerability, an attacker would have to log onto an affected system and run a specially crafted application. The update addresses the vulnerability by changing the way Windows Modules Installer Service discloses file information.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6760
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6760
CVE-2019-11135
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6758
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6758
CVE-2019-1392
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6763
Title:
Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6763
CVE-2019-1415
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations. To exploit the vulnerability, an attacker would require unprivileged execution on the victim system. After successfully exploiting the vulnerability, an attacker could run arbitrary code with elevated privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting the way Windows Installer handles certain filesystem operations.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6739
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6739
CVE-2019-1389
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6743
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6743
CVE-2019-1398
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6772
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6772
CVE-2019-1397
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6750
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6750
CVE-2019-0712
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6786
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6786
CVE-2019-1399
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by resolving a number of conditions where Hyper-V would fail to prevent a guest operating system from sending malicious requests.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6793
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6793
CVE-2019-1310
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6794
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6794
CVE-2019-1309
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6755
Title:
Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6755
CVE-2019-1435
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6746
Title:
Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6746
CVE-2019-1438
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6756
Title:
Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6756
CVE-2019-1437
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6773
Title:
Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6773
CVE-2019-1433
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6789
Title:
Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6789
CVE-2019-1407
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6792
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6792
CVE-2019-1439
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6764
Title:
Windows Error Reporting Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6764
CVE-2019-1374
Severity:
Medium
Description:
An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or convince a target to run a crafted application. The security update addresses the vulnerability by correcting the way WER handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6740
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6740
CVE-2019-1423
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file creation in protected locations. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the StartTileData.dll properly handles this type of function.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6748
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6748
CVE-2019-1422
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the iphlpsvc.dll handles file creation allowing for a file overwrite. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the iphlpsvc.dll properly handles this type of functionality.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6759
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6759
CVE-2019-1420
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the dssvc.dll handles file creation allowing for a file overwrite or creation in a secured location. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the dssvc.dll properly handles this type of functionality.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6742
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6742
CVE-2018-12207
Severity:
Medium
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6768
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6768
CVE-2019-1391
Severity:
Medium
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6745
Title:
Windows Data Sharing Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6745
CVE-2019-1383
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Data Sharing Service handles file operations.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6757
Title:
Windows Data Sharing Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6757
CVE-2019-1417
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Data Sharing Service handles file operations.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6782
Title:
Windows Data Sharing Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6782
CVE-2019-1379
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Data Sharing Service handles file operations.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6777
Title:
Windows Certificate Dialog Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6777
CVE-2019-1388
Severity:
High
Description:
An elevation of privilege vulnerability exists in the Windows Certificate Dialog when it does not properly enforce user privileges. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by ensuring Windows Certificate Dialog properly enforces user privileges.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6741
Title:
Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6741
CVE-2019-1385
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files. To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6752
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6752
CVE-2019-1440
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6754
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6754
CVE-2019-1436
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6747
Title:
Win32k Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6747
CVE-2019-1441
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit this vulnerability. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email message or in an Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email. In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit this vulnerability, and then convince a user to open the document file. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6753
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6753
CVE-2019-1396
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6744
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6744
CVE-2019-1394
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6761
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6761
CVE-2019-1393
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6762
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6762
CVE-2019-1408
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6769
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6769
CVE-2019-1395
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6790
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6790
CVE-2019-1434
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6749
Title:
OpenType Font Parsing Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6749
CVE-2019-1456
Severity:
Medium
Description:
A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by either convincing a user to open a specially crafted document, or by convincing a user to visit a webpage that contains specially crafted embedded OpenType fonts. The update addresses the vulnerability by correcting how the Windows Adobe Type Manager Library handles OpenType fonts.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6784
Title:
OpenType Font Parsing Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6784
CVE-2019-1419
Severity:
Medium
Description:
A remote code execution vulnerability exists in Microsoft Windows when the Windows Adobe Type Manager Library improperly handles specially crafted OpenType fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by either convincing a user to open a specially crafted document, or by convincing a user to visit a webpage that contains specially crafted embedded OpenType fonts. The update addresses the vulnerability by correcting how the Windows Adobe Type Manager Library handles OpenType fonts.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6771
Title:
OpenType Font Driver Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6771
CVE-2019-1412
Severity:
Low
Description:
An information disclosure vulnerability exists in Windows Adobe Type Manager Font Driver (ATMFD.dll) when it fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. Note that this vulnerability would not allow an attacker to execute code or to elevate their user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. To exploit this vulnerability, an attacker would have to log on to an affected system and open a document containing specially crafted fonts. The update addresses the vulnerability by correcting how ATMFD.dll handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6785
Title:
NetLogon Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6785
CVE-2019-1424
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Windows Netlogon improperly handles a secure communications channel. An attacker who successfully exploited the vulnerability could downgrade aspects of the connection allowing for further modification of the transmission. To exploit the vulnerability, an attacker would require an active man in the middle attack to be in place for the targeted traffic. The update addresses the vulnerability by modifying how Netlogon handles these connections, accounting for potential attack through a man in the middle.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6812
Title:
Multiple vulnerabilities on Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497...
Type:
Software
Bulletins:
CISEC:6812
Severity:
Low
Description:
Adobe Acrobat and Reader versions, 2019.012.20035 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2017.011.30142 and earlier, 2015.006.30497 and earlier, and 2015.006.30498 and earlier have a command injection vulnerability (CVE-2019-8060); have a buffer error vulnerability (CVE-2019-8048); have a double free vulnerability (CVE-2019-8044); have an internal ip disclosure vulnerability (CVE-2019-8097); have a type confusion vulnerability (CVE-2019-8019); have an out-of-bounds read vulnerability (CVE-2019-8077, CVE-2019-8094, CVE-2019-8095, CVE-2019-8096, CVE-2019-8102, CVE-2019-8103, CVE-2019-8104, CVE-2019-8105, CVE-2019-8106, CVE-2019-8002, CVE-2019-8004, CVE-2019-8005, CVE-2019-8007, CVE-2019-8010, CVE-2019-8011, CVE-2019-8012, CVE-2019-8018, CVE-2019-8020, CVE-2019-8021, CVE-2019-8032, CVE-2019-8035, CVE-2019-8037, CVE-2019-8040, CVE-2019-8043, CVE-2019-8052); have an out-of-bounds write vulnerability (CVE-2019-8098, CVE-2019-8100, CVE-2019-7965, CVE-2019-8008, CVE-2019-8009, CVE-2019-8016, CVE-2019-8022, CVE-2019-8023, CVE-2019-8027); have an use after free vulnerability (CVE-2019-8003, CVE-2019-8013, CVE-2019-8024, CVE-2019-8025, CVE-2019-8026, CVE-2019-8028, CVE-2019-8029, CVE-2019-8030, CVE-2019-8031, CVE-2019-8033, CVE-2019-8034, CVE-2019-8036, CVE-2019-8038, CVE-2019-8039, CVE-2019-8047, CVE-2019-8051, CVE-2019-8053, CVE-2019-8054, CVE-2019-8055, CVE-2019-8056, CVE-2019-8057, CVE-2019-8058, CVE-2019-8059, CVE-2019-8061); have a heap overflow vulnerability (CVE-2019-8014, CVE-2019-8015, CVE-2019-8041, CVE-2019-8042, CVE-2019-8046, CVE-2019-8049, CVE-2019-8050); have an integer overflow vulnerability (CVE-2019-8099, CVE-2019-8101); have an untrusted pointer dereference vulnerability (CVE-2019-8006, CVE-2019-8017, CVE-2019-8045). Successful exploitation could lead to arbitrary code execution. Adobe Acrobat and Reader versions, 2019.012.20034 and earlier, 2019.012.20035 and earlier, 2017.011.30142 and earlier, 2017.011.30143 and earlier, 2015.006.30497 and earlier, 2015.006.30498 and earlier versions have an Insufficiently Robust Encryption vulnerability (CVE-2019-8237). Successful exploitation could lead to Security feature bypass in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2019-12-20
Updated:
2021-06-04

ID:
CISEC:6815
Title:
Multiple vulnerabilities on Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and...
Type:
Software
Bulletins:
CISEC:6815
Severity:
Low
Description:
Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have a type confusion vulnerability (CVE-2019-7820), have a buffer error vulnerability (CVE-2019-7824), have a double free vulnerability (CVE-2019-7784), have a security bypass vulnerability (CVE-2019-7779), have an out-of-bounds write vulnerability (CVE-2019-7829, CVE-2019-7825, CVE-2019-7822, CVE-2019-7818, CVE-2019-7800, CVE-2019-7804), have a use after free vulnerability (CVE-2019-7834, CVE-2019-7833, CVE-2019-7831, CVE-2019-7830, CVE-2019-7821, CVE-2019-7817, CVE-2019-7814, CVE-2019-7809, CVE-2019-7808, CVE-2019-7807, CVE-2019-7806, CVE-2019-7805, CVE-2019-7796, CVE-2019-7792, CVE-2019-7791, CVE-2019-7788, CVE-2019-7786, CVE-2019-7785, CVE-2019-7783, CVE-2019-7782, CVE-2019-7781, CVE-2019-7772, CVE-2019-7768, CVE-2019-7767, CVE-2019-7766, CVE-2019-7765, CVE-2019-7763, CVE-2019-7762, CVE-2019-7761, CVE-2019-7760, CVE-2019-7759, CVE-2019-7823, CVE-2019-7797, CVE-2019-7835, CVE-2019-7764), have a heap overflow vulnerability (CVE-2019-7828, CVE-2019-7827, CVE-2019-7832). Successful exploitation could lead to arbitrary code execution. Adobe Acrobat and Reader versions 2019.010.20100 and earlier, 2019.010.20099 and earlier, 2017.011.30140 and earlier, 2017.011.30138 and earlier, 2015.006.30495 and earlier, and 2015.006.30493 and earlier have an out-of-bounds read vulnerability (CVE-2019-7841, CVE-2019-7836, CVE-2019-7826, CVE-2019-7813, CVE-2019-7812, CVE-2019-7811, CVE-2019-7810, CVE-2019-7803, CVE-2019-7802, CVE-2019-7801, CVE-2019-7798, CVE-2019-7795, CVE-2019-7794, CVE-2019-7793, CVE-2019-7790, CVE-2019-7789, CVE-2019-7778, CVE-2019-7777, CVE-2019-7776, CVE-2019-7775, CVE-2019-7774, CVE-2019-7773, CVE-2019-7771, CVE-2019-7770, CVE-2019-7769, CVE-2019-7145, CVE-2019-7144, CVE-2019-7143, CVE-2019-7142, CVE-2019-7141, CVE-2019-7140, CVE-2019-7787, CVE-2019-7799, CVE-2019-7780, CVE-2019-7758). Successful exploitation could lead to information disclosure. Adobe Acrobat and Reader versions 2019.010.20100 and earlier; 2019.010.20099 and earlier; 2017.011.30140 and earlier; 2017.011.30138 and earlier; 2015.006.30495 and earlier; and 2015.006.30493 and earlier have a Path Traversal vulnerability (CVE-2019-8238). Successful exploitation could lead to Information Disclosure in the context of the current user.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2019-12-20
Updated:
2021-06-04

ID:
CISEC:6814
Title:
Multiple vulnerabilities on Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier.
Type:
Software
Bulletins:
CISEC:6814
Severity:
Low
Description:
Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds read vulnerability (CVE-2019-7061, CVE-2019-7109, CVE-2019-7110, CVE-2019-7114, CVE-2019-7115, CVE-2019-7116, CVE-2019-7121, CVE-2019-7122, CVE-2019-7123, and CVE-2019-7127). Successful exploitation could lead to information disclosure. Adobe Acrobat and Reader versions 2019.010.20098 and earlier, 2019.010.20098 and earlier, 2017.011.30127 and earlier version, and 2015.006.30482 and earlier have an out-of-bounds write vulnerability (CVE-2019-7111, CVE-2019-7118, CVE-2019-7119, CVE-2019-7120, and CVE-2019-7124); have a type confusion vulnerability (CVE-2019-7117 and CVE-2019-7128); have an use after free vulnerability (CVE-2019-7088 and CVE-2019-7112); have a heap overflow vulnerability (CVE-2019-7113 and CVE-2019-7125). Successful exploitation could lead to arbitrary code execution.
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2019-12-20
Updated:
2021-06-04

ID:
CISEC:6810
Title:
Multiple vulnerabilities on Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier.
Type:
Software
Bulletins:
CISEC:6810
Severity:
Low
Description:
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a data leakage (sensitive) vulnerability (CVE-2019-7089); have an integer overflow vulnerability (CVE-2019-7030); have an out-of-bounds read vulnerability (CVE-2019-7021, CVE-2019-7022, CVE-2019-7023, CVE-2019-7024, CVE-2019-7028, CVE-2019-7032, CVE-2019-7033, CVE-2019-7034, CVE-2019-7035, CVE-2019-7036, CVE-2019-7038, CVE-2019-7045, CVE-2019-7047, CVE-2019-7049, CVE-2019-7053, CVE-2019-7055, CVE-2019-7056, CVE-2019-7057, CVE-2019-7058, CVE-2019-7059, CVE-2019-7063, CVE-2019-7064, CVE-2019-7065, CVE-2019-7067, CVE-2019-7071, CVE-2019-7073, CVE-2019-7074, CVE-2019-7081). Successful exploitation could lead to information disclosure. Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a double free vulnerability (CVE-2019-7080); have a buffer errors vulnerability (CVE-2019-7020, CVE-2019-7085); have an out-of-bounds write vulnerability (CVE-2019-7019, CVE-2019-7027, CVE-2019-7037, CVE-2019-7039, CVE-2019-7052, CVE-2019-7060, CVE-2019-7079); have a type confusion vulnerability (CVE-2019-7069, CVE-2019-7086, CVE-2019-7087); have an untrusted pointer dereference vulnerability (CVE-2019-7042, CVE-2019-7046, CVE-2019-7051, CVE-2019-7054, CVE-2019-7066, CVE-2019-7076); have an use after free vulnerability (CVE-2019-7018, CVE-2019-7025, CVE-2019-7026, CVE-2019-7029, CVE-2019-7031, CVE-2019-7040, CVE-2019-7043, CVE-2019-7044, CVE-2019-7048, CVE-2019-7050, CVE-2019-7062, CVE-2019-7068, CVE-2019-7070, CVE-2019-7072, CVE-2019-7075, CVE-2019-7077, CVE-2019-7078, CVE-2019-7082, CVE-2019-7083, CVE-2019-7084). Successful exploitation could lead to arbitrary code execution. Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability (CVE-2018-19725). Successful exploitation could lead to privilege escalation. Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a security bypass vulnerability (CVE-2019-7041)
Applies to:
Adobe Acrobat 2017
Adobe Acrobat DC Classic
Adobe Acrobat DC Continuous
Adobe Reader 2017
Adobe Reader DC Classic
Adobe Reader DC Continuous
Created:
2019-12-20
Updated:
2021-06-04

ID:
CISEC:6791
Title:
Microsoft Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6791
CVE-2019-1384
Severity:
Medium
Description:
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges. The issue has been addressed by changing how NTLM validates network authentication messages.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6774
Title:
Microsoft Windows Media Foundation Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6774
CVE-2019-1430
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Media Foundation improperly parses specially crafted QuickTime media files. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. To exploit the vulnerability, an attacker must send a specially crafted QuickTime file to a user and convince them to open it. When opened, the malicious QuickTime file will execute code of the attacker’s choice on the target system. The security update addresses the vulnerability by ensuring Windows Media Foundation properly parses QuickTime media files.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6775
Title:
Microsoft Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6775
CVE-2019-1381
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Servicing Stack allows access to unprivileged file locations. An attacker who successfully exploited the vulnerability could potentially access unauthorized files. To exploit this vulnerability, an authenticated attacker could run a specially crafted application in user mode. The update addresses the vulnerability by checking files paths for symbolic links.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6783
Title:
Microsoft splwow64 Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6783
CVE-2019-1380
Severity:
Medium
Description:
A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity. This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted. The security update addresses the vulnerability by ensuring splwow64.exe properly handles these calls..
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6779
Title:
Microsoft ActiveX Installer Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6779
CVE-2019-1382
Severity:
Low
Description:
An elevation of privilege vulnerability exists when ActiveX Installer service may allow access to files without proper authentication. An attacker who successfully exploited the vulnerability could potentially access unauthorized files. To exploit this vulnerability, an authenticated attacker could run a specially crafted application on the victim system. The update addresses the vulnerability by validated file permissions before accessing them.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6776
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6776
CVE-2019-1406
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6751
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6751
CVE-2019-0719
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Windows Hyper-V Network Switch validates guest operating system network traffic.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6787
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6787
CVE-2019-0721
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Windows Hyper-V Network Switch validates guest operating system network traffic.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6765
Title:
DirectWrite Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6765
CVE-2019-1432
Severity:
Medium
Description:
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6766
Title:
DirectWrite Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6766
CVE-2019-1411
Severity:
Medium
Description:
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-20
Updated:
2024-01-17

ID:
CISEC:6648
Title:
XmlLite Runtime Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6648
CVE-2019-1187
Severity:
Medium
Description:
A denial of service vulnerability exists when the XmlLite runtime (XmlLite.dll) improperly parses XML input. An attacker who successfully exploited this vulnerability could cause a denial of service against an XML application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an XML application. The update addresses the vulnerability by correcting how the XmlLite runtime parses XML input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6534
Title:
Winlogon Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6534
CVE-2019-1268
Severity:
High
Description:
An elevation of privilege exists when Winlogon does not properly handle file path information. An attacker who successfully exploited this vulnerability could run arbitrary code. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how Winlogon handles path information.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6505
Title:
Windows WLAN Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6505
CVE-2019-1085
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the wlansvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the wlansvc.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6523
Title:
Windows VBScript Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6523
CVE-2019-0842
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6524
Title:
Windows VBScript Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6524
CVE-2019-0772
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6641
Title:
Windows User Profile Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6641
CVE-2019-0986
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles symlinks. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and delete files or folders of their choosing. The security update addresses the vulnerability by correcting how the Windows User Profile Service handles symlinks.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6392
Title:
Windows Update Delivery Optimization Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6392
CVE-2019-1289
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Update Delivery Optimization does not properly enforce file share permissions. An attacker who successfully exploited the vulnerability could overwrite files that require higher privileges than what the attacker already has. To exploit this vulnerability, an attacker would need to log into a system. The attacker could then create a Delivery Optimization job to exploit the vulnerability. The security update addresses the vulnerability by correcting how the Delivery Optimization services enforces permissions.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6611
Title:
Windows Update Client Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6611
CVE-2019-1337
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Update Client fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could potentially disclose memory contents of an elevated process. To exploit this vulnerability, an authenticated attacker could run a specially crafted application in user mode. The update addresses the vulnerability by correcting how the Windows Update Client handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6513
Title:
Windows Transaction Manager Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6513
CVE-2019-1219
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Transaction Manager improperly handles objects in memory. An attacker who successfully exploited this vulnerability could potentially read data that was not intended to be disclosed. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application. The security update addresses the vulnerability by correcting how the Transaction Manager handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6649
Title:
Windows Text Service Framework Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6649
CVE-2019-1235
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows Text Service Framework (TSF) when the TSF server process does not validate the source of input or commands it receives. An attacker who successfully exploited this vulnerability could inject commands or read input sent through a malicious Input Method Editor (IME). This only affects systems that have installed an IME. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses this vulnerability by correcting how the TSF server and client validate input from each other.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6607
Title:
Windows TCP/IP Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6607
CVE-2019-0688
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented IP packets. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to send specially crafted fragmented IP packets to a remote Windows computer. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles fragmented IP packets.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6516
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6516
CVE-2019-0693
Severity:
Medium
Description:
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6553
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6553
CVE-2019-1185
Severity:
Medium
Description:
An elevation of privilege vulnerability exists due to a stack corruption in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6558
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6558
CVE-2019-0682
Severity:
Medium
Description:
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6408
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6408
CVE-2019-0694
Severity:
Medium
Description:
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6581
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6581
CVE-2019-0689
Severity:
Medium
Description:
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6637
Title:
Windows Subsystem for Linux Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6637
CVE-2019-0692
Severity:
Medium
Description:
An elevation of privilege vulnerability exists due to an integer overflow in Windows Subsystem for Linux. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6554
Title:
Windows Storage Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6554
CVE-2019-0983
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the Storage Services handles file operations.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6664
Title:
Windows Storage Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6664
CVE-2019-0931
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the Storage Services handles file operations.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6450
Title:
Windows Storage Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6450
CVE-2019-0998
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the Storage Services handles file operations.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6565
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6565
CVE-2019-0821
Severity:
Medium
Description:
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerability, an attacker would have to be able to authenticate and send SMB messages to an impacted Windows SMB Server The security update addresses the vulnerability by correcting how Windows SMB Server handles authenticated requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6667
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6667
CVE-2019-0704
Severity:
Medium
Description:
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerability, an attacker would have to be able to authenticate and send SMB messages to an impacted Windows SMB Server The security update addresses the vulnerability by correcting how Windows SMB Server handles authenticated requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6631
Title:
Windows SMB Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6631
CVE-2019-0703
Severity:
Medium
Description:
An information disclosure vulnerability exists in the way that the Windows SMB Server handles certain requests. An authenticated attacker who successfully exploited this vulnerability could craft a special packet, which could lead to information disclosure from the server. To exploit the vulnerability, an attacker would have to be able to authenticate and send SMB messages to an impacted Windows SMB Server The security update addresses the vulnerability by correcting how Windows SMB Server handles authenticated requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6633
Title:
Windows SMB Client Driver Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6633
CVE-2019-1293
Severity:
Low
Description:
An information disclosure vulnerability exists in Windows when the Windows SMB Client kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could potentially disclose contents of System memory. To exploit this vulnerability, an attacker would have to log on to the system first and then run a specially crafted application in user mode. The security update addresses the vulnerability by correcting how the Windows SMB Client kernel-mode driver handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6466
Title:
Windows Shell Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6466
CVE-2019-1053
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Shell fails to validate folder shortcuts. An attacker who successfully exploited the vulnerability could elevate privileges by escaping a sandbox. To exploit this vulnerability, an attacker would require unprivileged execution on the victim system. The security update addresses the vulnerability by correctly validating folder shortcuts.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6477
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6477
CVE-2019-0732
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerability by correcting how Windows validates User Mode Code Integrity policies.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6418
Title:
Windows Secure Kernel Mode Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6418
CVE-2019-1044
Severity:
High
Description:
A security feature bypass vulnerability exists when Windows Secure Kernel Mode fails to properly handle objects in memory. To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. An attacker who successfully exploited the vulnerability could violate virtual trust levels (VTL). The update addresses the vulnerability by correcting how Windows Secure Kernel Mode handles objects in memory to properly enforce VTLs.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6374
Title:
Windows Secure Boot Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6374
CVE-2019-1294
Severity:
Low
Description:
A security feature bypass exists when Windows Secure Boot improperly restricts access to debugging functionality. An attacker who successfully exploited this vulnerability could disclose protected kernel memory. To exploit the vulnerability, an attacker must gain physical access to the target system prior to the next system reboot. The security update addresses the vulnerability by preventing access to certain debugging options when Windows Secure Boot is enabled.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6398
Title:
Windows Secure Boot Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6398
CVE-2019-1368
Severity:
Low
Description:
A security feature bypass exists when Windows Secure Boot improperly restricts access to debugging functionality. An attacker who successfully exploited this vulnerability could disclose protected kernel memory. To exploit the vulnerability, an attacker must gain physical access to the target system prior to the next system reboot. The security update addresses the vulnerability by preventing access to certain debugging options when Windows Secure Boot is enabled.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6635
Title:
Windows RPCSS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6635
CVE-2019-1089
Severity:
High
Description:
An elevation of privilege vulnerability exists in rpcss.dll when the RPC service Activation Kernel improperly handles an RPC request. To exploit this vulnerability, a low level authenticated attacker could run a specially crafted application. The security update addresses this vulnerability by correcting how rpcss.dll handles these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6416
Title:
Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6416
CVE-2019-1326
Severity:
High
Description:
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding. To exploit this vulnerability, an attacker would need to run a specially crafted application against a server which provides Remote Desktop Protocol (RDP) services. The update addresses the vulnerability by correcting how RDP handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6645
Title:
Windows Remote Desktop Protocol (RDP) Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6645
CVE-2019-1223
Severity:
Medium
Description:
A denial of service vulnerability exists in Remote Desktop Protocol (RDP) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RDP service on the target system to stop responding. To exploit this vulnerability, an attacker would need to run a specially crafted application against a server which provides Remote Desktop Protocol (RDP) services. The update addresses the vulnerability by correcting how RDP handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6679
Title:
Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6679
CVE-2019-0856
Severity:
High
Description:
A remote code execution vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could take control of an affected system. To exploit the vulnerability, an authenticated attacker could connect via the Windows Remote Registry Service, causing Windows to execute arbitrary code. The security update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6675
Title:
Windows Redirected Drive Buffering System Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6675
CVE-2019-1325
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the Windows redirected drive buffering system (rdbss.sys) when the operating system improperly handles specific local calls within Windows 7 for 32-bit systems. When this vulnerability is exploited within other versions of Windows it can cause a denial of service, but not an elevation of privilege. To exploit this vulnerability, a low-level authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how rdbss.sys handles these local calls.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6356
Title:
Windows Print Spooler Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6356
CVE-2019-0759
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Print Spooler does not properly handle objects in memory. An attacker who successfully exploited this vulnerability could use the information to further exploit the victim system. To exploit this vulnerability, an attacker would have to first gain execution on the victim system. The update addresses the vulnerability by correcting how the Windows Print Spooler handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6445
Title:
Windows Power Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6445
CVE-2019-1341
Severity:
High
Description:
An elevation of privilege vulnerability exists when umpo.dll of the Power Service, improperly handles a Registry Restore Key function. An attacker who successfully exploited this vulnerability could delete a targeted registry key leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how umpo.dll of the Power Service handles Registry Restore Key requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6414
Title:
Windows OLE Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6414
CVE-2019-0885
Severity:
High
Description:
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code. To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted file or a program, causing Windows to execute arbitrary code. The update addresses the vulnerability by correcting how Windows OLE validates user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6542
Title:
Windows NTLM Tampering Vulnerability
Type:
Software
Bulletins:
CISEC:6542
CVE-2019-1166
Severity:
Medium
Description:
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection. An attacker who successfully exploited this vulnerability could gain the ability to downgrade NTLM security features. To exploit this vulnerability, the attacker would need to tamper with the NTLM exchange. The attacker could then modify flags of the NTLM packet without invalidating the signature. The update addresses the vulnerability by hardening NTLM MIC protection on the server-side.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6455
Title:
Windows NTLM Tampering Vulnerability
Type:
Software
Bulletins:
CISEC:6455
CVE-2019-1040
Severity:
Medium
Description:
A tampering vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLM MIC (Message Integrity Check) protection. An attacker who successfully exploited this vulnerability could gain the ability to downgrade NTLM security features. To exploit this vulnerability, the attacker would need to tamper with the NTLM exchange. The attacker could then modify flags of the NTLM packet without invalidating the signature. The update addresses the vulnerability by hardening NTLM MIC protection on the server-side.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6647
Title:
Windows NTLM Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6647
CVE-2019-1338
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully bypass the NTLMv2 protection if a client is also sending LMv2 responses. An attacker who successfully exploited this vulnerability could gain the ability to downgrade NTLM security features. To exploit this vulnerability, the attacker would need to be able to modify NTLM traffic exchange. The update addresses the vulnerability by hardening NTLMv2 protection on the server-side.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6357
Title:
Windows NTFS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6357
CVE-2019-1170
Severity:
High
Description:
An elevation of privilege vulnerability exists when reparse points are created by sandboxed processes allowing sandbox escape. An attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on an affected system. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by preventing sandboxed processes from creating reparse points targeting inaccessible files.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6629
Title:
Windows Network File System Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6629
CVE-2019-1045
Severity:
High
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network File System (NFS) handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows NFS properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6555
Title:
Windows Network Connectivity Assistant Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6555
CVE-2019-1287
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network Connectivity Assistant handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Network Connectivity Assistant properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6578
Title:
Windows NDIS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6578
CVE-2019-0707
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the Network Driver Interface Specification (NDIS) when ndis.sys fails to check the length of a buffer prior to copying memory to it. To exploit the vulnerability, in a local attack scenario, an attacker could run a specially crafted application to elevate the attacker's privilege level. An attacker who successfully exploited this vulnerability could run processes in an elevated context. However, an attacker must first gain access to the local system with the ability to execute a malicious application in order to exploit this vulnerability. The security update addresses the vulnerability by changing how ndis.sys validates buffer length.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6351
Title:
Windows Media Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6351
CVE-2019-1271
Severity:
High
Description:
An elevation of privilege exists in hdAudio.sys which may lead to an out of band write. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how hdAudio.sys stores the size of the reserved region.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6529
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6529
CVE-2019-1073
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6559
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6559
CVE-2019-0755
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6564
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6564
CVE-2019-1039
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6697
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6697
CVE-2019-1071
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6346
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6346
CVE-2019-1345
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6349
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6349
CVE-2019-0767
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6375
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6375
CVE-2019-0775
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6684
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6684
CVE-2019-1228
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6688
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6688
CVE-2019-1334
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6402
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6402
CVE-2019-1227
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6425
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6425
CVE-2019-1274
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows kernel initializes memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6470
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6470
CVE-2019-1125
Severity:
Low
Description:
An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6473
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6473
CVE-2019-0702
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6573
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6573
CVE-2019-0844
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6574
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6574
CVE-2019-0782
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows kernel initializes memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6626
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6626
CVE-2019-0840
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6651
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6651
CVE-2019-0663
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6541
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6541
CVE-2019-1164
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6545
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6545
CVE-2019-1159
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6696
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6696
CVE-2019-1067
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6662
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6662
CVE-2019-1065
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6478
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6478
CVE-2019-0696
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6602
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6602
CVE-2019-0881
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Kernel improperly handles key enumeration. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel properly handles key enumeration.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6660
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6660
CVE-2019-1041
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6652
Title:
Windows IOleCvt Interface Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6652
CVE-2019-0845
Severity:
High
Description:
A remote code execution vulnerability exists when the IOleCvt interface renders ASP webpage content. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. In a web-based attack scenario, an attacker could host a specially crafted website designed to exploit the vulnerability through Microsoft browsers and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the browser rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The update addresses the vulnerability by correcting methods exposed when the IOleCvt interface is invoked.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6381
Title:
Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6381
CVE-2019-0973
Severity:
High
Description:
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting the input sanitization error to preclude unintended elevation.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6501
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6501
CVE-2019-1172
Severity:
Medium
Description:
An information disclosure vulnerability exists in Azure Active Directory (AAD) Microsoft Account (MSA) during the login request session. An attacker who successfully exploited the vulnerability could take over a user's account. To exploit the vulnerability, an attacker would have to trick a user into browsing to a specially crafted website, allowing the attacker to steal the user's token. The security update addresses the vulnerability by correcting how MSA handles cookies.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6400
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6400
CVE-2019-0839
Severity:
Low
Description:
An information disclosure vulnerability exists when the Terminal Services component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The update addresses the vulnerability by correcting how the Terminal Services component handle objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6597
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6597
CVE-2019-0838
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Task Scheduler improperly discloses credentials to Windows Credential Manager. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability. The security update addresses the vulnerability by changing how Task Scheduler handles credentials.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6487
Title:
Windows Imaging API Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6487
CVE-2019-1311
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Imaging API improperly handles objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted .WIM file. The update addresses the vulnerability by modifying how the WIM service handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6539
Title:
Windows Image Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6539
CVE-2019-1190
Severity:
High
Description:
An elevation of privilege vulnerability exists in the way that the Windows kernel image handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows kernel image properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6405
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6405
CVE-2019-0709
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6439
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6439
CVE-2019-0620
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6440
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6440
CVE-2019-0722
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6615
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6615
CVE-2019-0965
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6517
Title:
Windows Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6517
CVE-2019-1254
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Hyper-V writes uninitialized memory to disk. An attacker could exploit the vulnerability by reading a file to recover kernel memory. To exploit the vulnerability, an attacker would first require access to a Hyper-V host. The security update addresses the vulnerability by ensuring Hyper-V properly initializes memory before writing it to disk.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6677
Title:
Windows Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6677
CVE-2019-0886
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. An attacker who successfully exploited the vulnerability could gain access to information on the Hyper-V host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6590
Title:
Windows Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6590
CVE-2019-0695
Severity:
Medium
Description:
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. An attacker who successfully exploited the vulnerability could gain access to information on the Hyper-V host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6494
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6494
CVE-2019-0701
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by resolving a number of conditions where Hyper-V would fail to prevent a guest operating system from sending malicious requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6480
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6480
CVE-2019-0717
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6515
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6515
CVE-2019-0690
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6531
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6531
CVE-2019-0718
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6543
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6543
CVE-2019-0966
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by resolving a number of conditions where Hyper-V would fail to prevent a guest operating system from sending malicious requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6666
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6666
CVE-2019-0713
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by resolving a number of conditions where Hyper-V would fail to prevent a guest operating system from sending malicious requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6436
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6436
CVE-2019-0710
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by resolving a number of conditions where Hyper-V would fail to prevent a guest operating system from sending malicious requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6458
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6458
CVE-2019-0714
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6606
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6606
CVE-2019-0723
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6571
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6571
CVE-2019-0715
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6625
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6625
CVE-2019-0928
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by resolving a number of conditions where Hyper-V would fail to prevent a guest operating system from sending malicious requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6636
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6636
CVE-2019-0711
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate input from a privileged user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by resolving a number of conditions where Hyper-V would fail to prevent a guest operating system from sending malicious requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6486
Title:
Windows Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6486
CVE-2019-1143
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage. The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6444
Title:
Windows Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6444
CVE-2019-1154
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage. The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6658
Title:
Windows Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6658
CVE-2019-1158
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage. The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6481
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6481
CVE-2019-1286
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6511
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6511
CVE-2019-0849
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6532
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6532
CVE-2019-1013
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6546
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6546
CVE-2019-1116
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6548
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6548
CVE-2019-1016
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6557
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6557
CVE-2019-0977
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6693
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6693
CVE-2019-1012
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6342
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6342
CVE-2019-0968
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6343
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6343
CVE-2019-0882
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6347
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6347
CVE-2019-0802
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6348
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6348
CVE-2019-1363
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how GDI handles memory addresses.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6358
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6358
CVE-2019-1094
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6360
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6360
CVE-2019-1098
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6370
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6370
CVE-2019-1047
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6371
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6371
CVE-2019-0614
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6377
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6377
CVE-2019-0961
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6383
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6383
CVE-2019-1009
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6661
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6661
CVE-2019-1099
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6678
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6678
CVE-2019-1015
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6399
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6399
CVE-2019-1010
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6394
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6394
CVE-2019-1048
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6419
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6419
CVE-2019-1101
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6427
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6427
CVE-2019-1095
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6446
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6446
CVE-2019-1011
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6467
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6467
CVE-2019-1252
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6476
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6476
CVE-2019-1046
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6604
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6604
CVE-2019-1050
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6579
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6579
CVE-2019-0774
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6585
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6585
CVE-2019-1100
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6598
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6598
CVE-2019-0758
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6601
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6601
CVE-2019-1049
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6475
Title:
Windows File Signature Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6475
CVE-2019-1163
Severity:
Medium
Description:
A security feature bypass exists when Windows incorrectly validates CAB file signatures. An attacker who successfully exploited this vulnerability could inject code into a CAB file without invalidating the file's signature. To exploit the vulnerability, an attacker could modify a signed CAB file and inject malicious code. The attacker could then convince a target user to execute the file. The update addresses the vulnerability by correcting how Windows validates file signatures.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6685
Title:
Windows Event Viewer Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6685
CVE-2019-0948
Severity:
Medium
Description:
An information disclosure vulnerability exists in the Windows Event Viewer (eventvwr.msc) when it improperly parses XML input containing a reference to an external entity. An attacker who successfully exploited this vulnerability could read arbitrary files via an XML external entity (XXE) declaration. To exploit the vulnerability, an attacker could create a file containing specially crafted XML content and convince an authenticated user to import the file. The update addresses the vulnerability by modifying the way that the Event Viewer parses XML input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6484
Title:
Windows Error Reporting Manager Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6484
CVE-2019-1315
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows Error Reporting manager handles hard links.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6376
Title:
Windows Error Reporting Manager Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6376
CVE-2019-1342
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash. An attacker who successfully exploited this vulnerability could delete a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows Error Reporting manager handles process crashes.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6397
Title:
Windows Error Reporting Manager Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6397
CVE-2019-1339
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows Error Reporting manager handles hard links.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6550
Title:
Windows Error Reporting Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6550
CVE-2019-1319
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it. An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functionality. To exploit the vulnerability, an attacker could run a specially crafted application. The security update addresses the vulnerability by correcting the way that WER handles and executes files.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6412
Title:
Windows Error Reporting Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6412
CVE-2019-0863
Severity:
High
Description:
An elevation of privilege vulnerability exists in the way Windows Error Reporting (WER) handles files. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with administrator privileges. To exploit the vulnerability, an attacker must first gain unprivileged execution on a victim system. The security update addresses the vulnerability by correcting the way WER handles files.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6420
Title:
Windows Error Reporting Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6420
CVE-2019-1037
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way Windows Error Reporting (WER) handles files. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with administrator privileges. To exploit the vulnerability, an attacker must first gain unprivileged execution on a victim system. The security update addresses the vulnerability by correcting the way WER handles files.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6492
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6492
CVE-2019-1253
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how AppX Deployment Server handles junctions.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6485
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6485
CVE-2019-1180
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the wcmsvc.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6504
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6504
CVE-2019-0805
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to LUAFV.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6525
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6525
CVE-2019-0836
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to LUAFV.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6535
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6535
CVE-2019-0796
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could set the short name of a file with a long name to an arbitrary short name, overriding the file system with limited privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability. The update addresses the vulnerability by correcting how Windows handles calls to LUAFV.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6552
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6552
CVE-2019-1292
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Microsoft Windows when Windows fails to properly handle certain symbolic links. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows handles symbolic links.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6563
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6563
CVE-2019-1184
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows Core Shell COM Server Registrar improperly handles COM calls. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting unprotected COM calls.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6568
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6568
CVE-2019-1215
Severity:
High
Description:
An elevation of privilege vulnerability exists in the way that ws2ifsl.sys (Winsock) handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated privileges. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring that ws2ifsl.sys properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6698
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6698
CVE-2019-0936
Severity:
High
Description:
An elevation of privilege vulnerability exists in Microsoft Windows when Windows fails to properly handle certain symbolic links. An attacker who successfully exploited this vulnerability could potentially set certain items to run at a higher level and thereby elevate permissions. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows handles symbolic links.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6350
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6350
CVE-2019-1130
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6355
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6355
CVE-2019-0734
Severity:
High
Description:
An elevation of privilege vulnerability exists in Microsoft Windows when a man-in-the-middle attacker is able to successfully decode and replace authentication request using Kerberos, allowing an attacker to be validated as an Administrator. The update addresses this vulnerability by changing how these requests are validated.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6422
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6422
CVE-2019-1177
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the rpcss.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the rpcss.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6429
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6429
CVE-2019-1178
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the ssdpsrv.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6431
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6431
CVE-2019-0730
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to LUAFV.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6432
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6432
CVE-2019-1186
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the wcmsvc.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6452
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6452
CVE-2019-1175
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the psmsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the psmsrv.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6462
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6462
CVE-2019-1129
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6468
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6468
CVE-2019-1173
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the PsmServiceExtHost.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the PsmServiceExtHost.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6474
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6474
CVE-2019-1064
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6582
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6582
CVE-2019-0731
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to the LUAFV driver (luafv.sys). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to LUAFV.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6583
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6583
CVE-2019-0841
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows AppX Deployment Service (AppXSVC) improperly handles hard links. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows AppX Deployment Service handles hard links.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6612
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6612
CVE-2019-1174
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the PsmServiceExtHost.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the PsmServiceExtHost.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6627
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6627
CVE-2019-1278
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the unistore.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the unistore.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6654
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6654
CVE-2019-1303
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows AppX Deployment Server improperly handles junctions. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how AppX Deployment Server handles junctions.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6655
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6655
CVE-2019-1179
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the unistore.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the unistore.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6407
Title:
Windows dnsrlvr.dll Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6407
CVE-2019-1090
Severity:
High
Description:
An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the dnsrslvr.dll properly handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6691
Title:
Windows DNS Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6691
CVE-2019-0811
Severity:
Medium
Description:
A denial of service vulnerability exists in Windows DNS Server when it fails to properly handle DNS queries. An attacker who successfully exploited this vulnerability could cause the DNS Server service to become nonresponsive. To exploit the vulnerability, an unauthenticated attacker could send malicious DNS queries to an affected server, resulting in a denial of service. However, the DNS server must be configured to use DNS Analytical Logging for the attack to succeed. The update addresses the vulnerability by correcting how Windows DNS Server processes DNS queries.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6561
Title:
Windows DHCP Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6561
CVE-2019-0785
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability could either run arbitrary code on the DHCP failover server or cause the DHCP service to become nonresponsive. To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP server. However, the DHCP server must be set to failover mode for the attack to succeed. The security update addresses the vulnerability by correcting how DHCP failover servers handle network packets.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6417
Title:
Windows DHCP Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6417
CVE-2019-1213
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server. To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP server. The security update addresses the vulnerability by correcting how DHCP servers handle network packets.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6457
Title:
Windows DHCP Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6457
CVE-2019-0725
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially crafted packets. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server. To exploit the vulnerability, a remote unauthenticated attacker could send a specially crafted packet to an affected DHCP server. The security update addresses the vulnerability by correcting how DHCP servers handle network packets.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6521
Title:
Windows DHCP Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6521
CVE-2019-1206
Severity:
Medium
Description:
A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server. An attacker who successfully exploited the vulnerability could cause the DHCP service to become nonresponsive. To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP server. However, the DHCP server must be set to failover mode for the attack to succeed. The security update addresses the vulnerability by correcting how DHCP failover servers handle network packets.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6442
Title:
Windows DHCP Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6442
CVE-2019-1212
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows Server DHCP service when processing specially crafted packets. An attacker who successfully exploited the vulnerability could cause the DHCP server service to stop responding. To exploit the vulnerability, a remote unauthenticated attacker could send a specially crafted packet to an affected DHCP server. The security update addresses the vulnerability by correcting how DHCP servers handle network packets.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6522
Title:
Windows DHCP Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6522
CVE-2019-0697
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine. To exploit the vulnerability, an attacker could send specially crafted DHCP responses to a client. The security update addresses the vulnerability by correcting how Windows DHCP clients handle certain DHCP responses.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6361
Title:
Windows DHCP Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6361
CVE-2019-0698
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine. To exploit the vulnerability, an attacker could send specially crafted DHCP responses to a client. The security update addresses the vulnerability by correcting how Windows DHCP clients handle certain DHCP responses.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6384
Title:
Windows DHCP Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6384
CVE-2019-0736
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine. To exploit the vulnerability, an attacker could send specially crafted DHCP responses to a client. The security update addresses the vulnerability by correcting how Windows DHCP clients handle certain DHCP responses.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6593
Title:
Windows DHCP Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6593
CVE-2019-0726
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine. To exploit the vulnerability, an attacker could send specially crafted DHCP responses to a client. The security update addresses the vulnerability by correcting how Windows DHCP clients handle certain DHCP responses.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6368
Title:
Windows Deployment Services TFTP Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6368
CVE-2019-0603
Severity:
High
Description:
A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attacker could create a specially crafted request, causing Windows to execute arbitrary code with elevated permissions. The security update addresses the vulnerability by correcting how Windows Deployment Services TFTP Server handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6490
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6490
CVE-2019-0754
Severity:
Medium
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6530
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6530
CVE-2019-1346
Severity:
High
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or to convince a user to open a specific file on a network share. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6676
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6676
CVE-2019-1347
Severity:
High
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or to convince a user to open a specific file on a network share. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6409
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6409
CVE-2019-0716
Severity:
Medium
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6646
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6646
CVE-2019-1025
Severity:
High
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or to convince a user to open a specific file on a network share. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6656
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6656
CVE-2019-1343
Severity:
High
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or to convince a user to open a specific file on a network share. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6586
Title:
Windows CSRSS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6586
CVE-2019-0735
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Client Server Run-Time Subsystem (CSRSS) fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows CSRSS handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6639
Title:
Windows Common Log File System Driver Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6639
CVE-2019-1282
Severity:
Low
Description:
An information disclosure exists in the Windows Common Log File System (CLFS) driver when it fails to properly handle sandbox checks. An attacker who successfully exploited this vulnerability could potentially read data outside their expected limits. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application. The security update addresses the vulnerability by correcting how CLFS handles sandbox checks.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6533
Title:
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6533
CVE-2019-0959
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6682
Title:
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6682
CVE-2019-0984
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6464
Title:
Windows Common Log File System Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6464
CVE-2019-1214
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6617
Title:
Windows Code Integrity Module Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6617
CVE-2019-1344
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the Windows Code Integrity Module handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or convince a target to run a crafted application. The security update addresses the vulnerability by modifying how the Code Integrity Module handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6488
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6488
CVE-2019-1086
Severity:
Medium
Description:
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6506
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6506
CVE-2019-1022
Severity:
Medium
Description:
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6556
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6556
CVE-2019-1021
Severity:
Medium
Description:
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6672
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6672
CVE-2019-1087
Severity:
Medium
Description:
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6438
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6438
CVE-2019-1027
Severity:
Medium
Description:
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6471
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6471
CVE-2019-1277
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows Audio Service when a malformed parameter is processed. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges when used in conjunction with another vulnerability. To exploit the vulnerability, an attacker could run a specially crafted application locally. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles these parameters.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6589
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6589
CVE-2019-1088
Severity:
Medium
Description:
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6592
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6592
CVE-2019-1026
Severity:
Medium
Description:
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6596
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6596
CVE-2019-1007
Severity:
Medium
Description:
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6616
Title:
Windows Audio Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6616
CVE-2019-1028
Severity:
Medium
Description:
An elevation of privilege exists in Windows Audio Service. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the Windows Audio Service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6495
Title:
Windows ALPC Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6495
CVE-2019-1269
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to ALPC.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6472
Title:
Windows ALPC Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6472
CVE-2019-1162
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to ALPC.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6584
Title:
Windows ALPC Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6584
CVE-2019-1272
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to ALPC.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6650
Title:
Windows ALPC Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6650
CVE-2019-0943
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to ALPC.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6387
Title:
Windows ActiveX Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6387
CVE-2019-0784
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the ActiveX Data objects (ADO) handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the ActiveX Data objects handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6500
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6500
CVE-2019-0814
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6518
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6518
CVE-2019-1096
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6372
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6372
CVE-2019-0848
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6603
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6603
CVE-2019-0776
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an attacker would have to either log on locally to an affected system, or convince a locally authenticated user to execute a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6498
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6498
CVE-2019-0685
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6537
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6537
CVE-2019-0797
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6544
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6544
CVE-2019-0859
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6547
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6547
CVE-2019-0892
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6369
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6369
CVE-2019-1256
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6388
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6388
CVE-2019-1017
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6663
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6663
CVE-2019-0803
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6683
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6683
CVE-2019-1285
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6396
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6396
CVE-2019-1362
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6390
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6390
CVE-2019-1364
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6428
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6428
CVE-2019-1169
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6461
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6461
CVE-2019-1132
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6594
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6594
CVE-2019-0960
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6618
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6618
CVE-2019-0808
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6624
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6624
CVE-2019-1014
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6332
Title:
VBScript Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6332
CVE-2019-1238
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'.
Applies to:
Microsoft Internet Explorer 11
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6327
Title:
VBScript Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6327
CVE-2019-1239
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'.
Applies to:
Microsoft Internet Explorer 11
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6344
Title:
Unified Write Filter Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6344
CVE-2019-0942
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the Unified Write Filter (UWF) feature for Windows 10 when it improperly restricts access to the registry. An attacker who successfully exploited the vulnerability could make changes to the registry keys protected by UWF without having administrator privileges. To exploit the vulnerability, an attacker would have to log on to an affected system utilizing UWF and access the registry editor. The security update addresses the vulnerability by correcting how the Unified Write Filter verifies privileges when accessing the registry.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6680
Title:
Task Scheduler Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6680
CVE-2019-1069
Severity:
High
Description:
An elevation of privilege vulnerability exists in the way the Task Scheduler Service validates certain file operations. An attacker who successfully exploited the vulnerability could gain elevated privileges on a victim system. To exploit the vulnerability, an attacker would require unprivileged code execution on a victim system. The security update addresses the vulnerability by correctly validating file operations.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6634
Title:
SymCrypt Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6634
CVE-2019-1171
Severity:
Low
Description:
An information disclosure vulnerability exists in SymCrypt during the OAEP decryption stage. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability through a software change to the OAEP decoding operations.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6395
Title:
SymCrypt Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6395
CVE-2019-0865
Severity:
Medium
Description:
A denial of service vulnerability exists when SymCrypt improperly handles a specially crafted digital signature. An attacker could exploit the vulnerability by creating a specially crafted connection or message. The security update addresses the vulnerability by correcting the way SymCrypt handles digital signatures.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6512
Title:
Remote Desktop Services Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6512
CVE-2019-1182
Severity:
High
Description:
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6671
Title:
Remote Desktop Services Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6671
CVE-2019-0708
Severity:
High
Description:
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6674
Title:
Remote Desktop Services Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6674
CVE-2019-1181
Severity:
High
Description:
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6435
Title:
Remote Desktop Services Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6435
CVE-2019-1226
Severity:
High
Description:
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6572
Title:
Remote Desktop Services Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6572
CVE-2019-1222
Severity:
High
Description:
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6580
Title:
Remote Desktop Services Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6580
CVE-2019-0887
Severity:
High
Description:
A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an authenticated attacker abuses clipboard redirection. An attacker who successfully exploited this vulnerability could execute arbitrary code on the victim system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker must already have compromised a system running Remote Desktop Services, and then wait for a victim system to connect to Remote Desktop Services. The update addresses the vulnerability by correcting how Remote Desktop Services handles clipboard redirection.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6441
Title:
Remote Desktop Protocol Server Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6441
CVE-2019-1224
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system. To exploit this vulnerability, an attacker would have to connect remotely to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows RDP server initializes memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6642
Title:
Remote Desktop Protocol Server Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6642
CVE-2019-1225
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows RDP server improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the system. To exploit this vulnerability, an attacker would have to connect remotely to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows RDP server initializes memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6577
Title:
Remote Desktop Protocol Client Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6577
CVE-2019-1108
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows RDP client improperly discloses the contents of its memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to connect remotely to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows RDP client initializes memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6378
Title:
Remote Desktop Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6378
CVE-2019-1291
Severity:
High
Description:
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to have control of a server and then convince a user to connect to it. An attacker would have no way of forcing a user to connect to the malicious server, they would need to trick the user into connecting via social engineering, DNS poisoning or using a Man in the Middle (MITM) technique. An attacker could also compromise a legitimate server, host malicious code on it, and wait for the user to connect. The update addresses the vulnerability by correcting how the Windows Remote Desktop Client handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6690
Title:
Remote Desktop Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6690
CVE-2019-0788
Severity:
High
Description:
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to have control of a server and then convince a user to connect to it. An attacker would have no way of forcing a user to connect to the malicious server, they would need to trick the user into connecting via social engineering, DNS poisoning or using a Man in the Middle (MITM) technique. An attacker could also compromise a legitimate server, host malicious code on it, and wait for the user to connect. The update addresses the vulnerability by correcting how the Windows Remote Desktop Client handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6595
Title:
Remote Desktop Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6595
CVE-2019-0787
Severity:
High
Description:
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to have control of a server and then convince a user to connect to it. An attacker would have no way of forcing a user to connect to the malicious server, they would need to trick the user into connecting via social engineering, DNS poisoning or using a Man in the Middle (MITM) technique. An attacker could also compromise a legitimate server, host malicious code on it, and wait for the user to connect. The update addresses the vulnerability by correcting how the Windows Remote Desktop Client handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6628
Title:
Remote Desktop Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6628
CVE-2019-1333
Severity:
High
Description:
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to have control of a server and then convince a user to connect to it. An attacker would have no way of forcing a user to connect to the malicious server, they would need to trick the user into connecting via social engineering, DNS poisoning or using a Man in the Middle (MITM) technique. An attacker could also compromise a legitimate server, host malicious code on it, and wait for the user to connect. The update addresses the vulnerability by correcting how the Windows Remote Desktop Client handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6643
Title:
Remote Desktop Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6643
CVE-2019-1290
Severity:
High
Description:
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to have control of a server and then convince a user to connect to it. An attacker would have no way of forcing a user to connect to the malicious server, they would need to trick the user into connecting via social engineering, DNS poisoning or using a Man in the Middle (MITM) technique. An attacker could also compromise a legitimate server, host malicious code on it, and wait for the user to connect. The update addresses the vulnerability by correcting how the Windows Remote Desktop Client handles connection requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6367
Title:
OLE Automation Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6367
CVE-2019-0794
Severity:
High
Description:
A remote code execution vulnerability exists when OLE automation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could gain execution on the victim system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke OLE automation through a web browser. However, an attacker would have to entice a user to visit such a website. The update addresses the vulnerability by correcting how OLE automation handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6493
Title:
MS XML Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6493
CVE-2019-0795
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the user’s system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6527
Title:
MS XML Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6527
CVE-2019-0756
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the user’s system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6694
Title:
MS XML Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6694
CVE-2019-0792
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the user’s system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6665
Title:
MS XML Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6665
CVE-2019-1057
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the user’s system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6668
Title:
MS XML Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6668
CVE-2019-0793
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the user’s system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6411
Title:
MS XML Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6411
CVE-2019-0790
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the user’s system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6469
Title:
MS XML Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6469
CVE-2019-1060
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the user’s system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6576
Title:
MS XML Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6576
CVE-2019-0791
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the user’s system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6502
Title:
Microsoft Windows Update Client Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6502
CVE-2019-1336
Severity:
High
Description:
An elevation of privilege vulnerability exists in the Microsoft Windows Update Client when it does not properly handle privileges. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by enabling the Windows Update client to properly handle user privileges.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6519
Title:
Microsoft Windows Update Client Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6519
CVE-2019-1323
Severity:
High
Description:
An elevation of privilege vulnerability exists in the Microsoft Windows Update Client when it does not properly handle privileges. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by enabling the Windows Update client to properly handle user privileges.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6386
Title:
Microsoft Windows Transport Layer Security Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:6386
CVE-2019-1318
Severity:
Medium
Description:
A spoofing vulnerability exists when Transport Layer Security (TLS) accesses non- Extended Master Secret (EMS) sessions. An attacker who successfully exploited this vulnerability may gain access to unauthorized information. To exploit the vulnerability, an attacker would have to conduct a man-in-the-middle attack. The update addresses the vulnerability by correcting how TLS client and server establish and resume sessions with non-EMS peers.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6352
Title:
Microsoft Windows Store Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6352
CVE-2019-1270
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows store installer where WindowsApps directory is vulnerable to symbolic link attack. An attacker who successfully exploited this vulnerability could bypass access restrictions to add or remove files. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and add or remove files. The security update addresses the vulnerability by not allowing reparse points in the WindowsApps directory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6423
Title:
Microsoft Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6423
CVE-2019-1019
Severity:
Medium
Description:
A security feature bypass vulnerability exists where a NETLOGON message is able to obtain the session key and sign messages. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could access another machine using the original user privileges. The issue has been addressed by changing how NTLM validates network authentication messages.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6456
Title:
Microsoft Windows p2pimsvc Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6456
CVE-2019-1168
Severity:
High
Description:
An elevation of privilege exists in the p2pimsvc service where an attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the p2pimsvc service handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6497
Title:
Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6497
CVE-2019-1322
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Windows improperly handles authentication requests. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way Windows handles authentication requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6499
Title:
Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6499
CVE-2019-1340
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows AppX Deployment Server that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by not permitting Windows AppX Deployment Server to create files in arbitrary locations.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6669
Title:
Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6669
CVE-2019-1198
Severity:
High
Description:
An elevation of privilege exists in SyncController.dll. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the SyncController.dll handles processes these requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6591
Title:
Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6591
CVE-2019-1082
Severity:
High
Description:
An elevation of privilege vulnerability exists in Microsoft Windows where a certain DLL, with Local Service privilege, is vulnerable to race planting a customized DLL. An attacker who successfully exploited this vulnerability could potentially elevate privilege to SYSTEM. The update addresses this vulnerability by requiring SYSTEM privileges for a certain DLL.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6614
Title:
Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6614
CVE-2019-0766
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows AppX Deployment Server that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by not permitting Windows AppX Deployment Server to create files in arbitrary locations.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6653
Title:
Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6653
CVE-2019-1074
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Microsoft Windows where certain folders, with local service privilege, are vulnerable to symbolic link attack. An attacker who successfully exploited this vulnerability could potentially access unauthorized information. The update addresses this vulnerability by not allowing symbolic links in these scenarios.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6659
Title:
Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6659
CVE-2019-1320
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Windows improperly handles authentication requests. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way Windows handles authentication requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6562
Title:
Microsoft Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6562
CVE-2019-1317
Severity:
Medium
Description:
A denial of service vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would allow an attacker to overwrite system files. The update addresses the vulnerability by correcting ACLs to system files.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6608
Title:
Microsoft Windows CloudStore Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6608
CVE-2019-1321
Severity:
High
Description:
An elevation of privilege vulnerability exists when Windows CloudStore improperly handles file Discretionary Access Control List (DACL). An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows CloudStore handles DACLs.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6569
Title:
Microsoft unistore.dll Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6569
CVE-2019-1091
Severity:
Low
Description:
An information disclosure vulnerability exists when Unistore.dll fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could potentially disclose memory contents of an elevated process. To exploit this vulnerability, an authenticated attacker could run a specially crafted application in user mode. The update addresses the vulnerability by correcting how the Unistore.dll handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6620
Title:
Microsoft splwow64 Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6620
CVE-2019-0880
Severity:
Medium
Description:
A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity. This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6587
Title:
Microsoft Speech API Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6587
CVE-2019-0985
Severity:
Medium
Description:
A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language. The update address the vulnerability by modifying how the system handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6599
Title:
Microsoft IIS Server Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6599
CVE-2019-1365
Severity:
High
Description:
An elevation of privilege vulnerability exists when Microsoft IIS Server fails to check the length of a buffer prior to copying memory to it. An attacker who successfully exploited this vulnerability can allow an unprivileged function ran by the user to execute code in the context of NT AUTHORITY\system escaping the Sandbox. The security update addresses the vulnerability by correcting how Microsoft IIS Server sanitizes web requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6345
Title:
Microsoft IIS Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6345
CVE-2019-0941
Severity:
Medium
Description:
A denial of service exists in Microsoft IIS Server when the optional request filtering feature improperly handles requests. An attacker who successfully exploited this vulnerability could perform a temporary denial of service against pages configured to use request filtering. To exploit this vulnerability, an attacker could send a specially crafted request to a page utilizing request filtering. The update addresses the vulnerability by changing the way certain requests are processed by the filter.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6538
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6538
CVE-2019-1144
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or instant message that takes users to the attacker's website, or by opening an attachment sent through email. In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability and then convince users to open the document file. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6540
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6540
CVE-2019-1150
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or instant message that takes users to the attacker's website, or by opening an attachment sent through email. In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability and then convince users to open the document file. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6363
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6363
CVE-2019-1152
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or instant message that takes users to the attacker's website, or by opening an attachment sent through email. In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability and then convince users to open the document file. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6403
Title:
Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6403
CVE-2019-1145
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or instant message that takes users to the attacker's website, or by opening an attachment sent through email. In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability and then convince users to open the document file. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6373
Title:
Microsoft Graphics Components Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6373
CVE-2019-1283
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information that could be useful for further exploitation. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6681
Title:
Microsoft Graphics Components Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6681
CVE-2019-1361
Severity:
Medium
Description:
An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information that could be useful for further exploitation. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6453
Title:
Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6453
CVE-2019-1078
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows Graphics Component handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6382
Title:
Microsoft Compatibility Appraiser Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6382
CVE-2019-1267
Severity:
High
Description:
An elevation of privilege vulnerability exists in Microsoft Compatibility Appraiser where a configuration file, with local privileges, is vulnerable to symbolic link and hard link attacks. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by writing the file to a location with an appropriate Access Control List.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6424
Title:
Local Security Authority Subsystem Service Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6424
CVE-2019-0972
Severity:
Medium
Description:
This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS) caused when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system. The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6508
Title:
LNK Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6508
CVE-2019-1280
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The attacker could present to the user a removable drive, or remote share, that contains a malicious .LNK file and an associated malicious binary. When the user opens this drive(or remote share) in Windows Explorer, or any other application that parses the .LNK file, the malicious binary will execute code of the attacker’s choice, on the target system. The security update addresses the vulnerability by correcting the processing of shortcut LNK references.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6401
Title:
LNK Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6401
CVE-2019-1188
Severity:
High
Description:
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The attacker could present to the user a removable drive, or remote share, that contains a malicious .LNK file and an associated malicious binary. When the user opens this drive(or remote share) in Windows Explorer, or any other application that parses the .LNK file, the malicious binary will execute code of the attacker’s choice, on the target system. The security update addresses the vulnerability by correcting the processing of shortcut LNK references.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6496
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6496
CVE-2019-0890
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6482
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6482
CVE-2019-0909
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6503
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6503
CVE-2019-1240
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6507
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6507
CVE-2019-0904
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6520
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6520
CVE-2019-1242
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6536
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6536
CVE-2019-1250
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6560
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6560
CVE-2019-1248
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6695
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6695
CVE-2019-1358
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6353
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6353
CVE-2019-0891
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6364
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6364
CVE-2019-1146
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6379
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6379
CVE-2019-1241
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6380
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6380
CVE-2019-0898
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6670
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6670
CVE-2019-1247
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6673
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6673
CVE-2019-1147
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6687
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6687
CVE-2019-1249
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6692
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6692
CVE-2019-0894
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6391
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6391
CVE-2019-0897
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6393
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6393
CVE-2019-0905
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6404
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6404
CVE-2019-1359
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6413
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6413
CVE-2019-0877
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6426
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6426
CVE-2019-0901
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6433
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6433
CVE-2019-1157
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6434
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6434
CVE-2019-0851
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6437
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6437
CVE-2019-0906
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6448
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6448
CVE-2019-0899
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6449
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6449
CVE-2019-0900
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6451
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6451
CVE-2019-0974
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6465
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6465
CVE-2019-0895
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6479
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6479
CVE-2019-0889
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6605
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6605
CVE-2019-0893
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6575
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6575
CVE-2019-1243
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6588
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6588
CVE-2019-1156
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6600
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6600
CVE-2019-0907
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6613
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6613
CVE-2019-0847
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6619
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6619
CVE-2019-0902
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6621
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6621
CVE-2019-0879
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6630
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6630
CVE-2019-0908
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6632
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6632
CVE-2019-0617
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6640
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6640
CVE-2019-0846
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6644
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6644
CVE-2019-0896
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6329
Title:
Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:6329
CVE-2019-1371
Severity:
High
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'.
Applies to:
Microsoft Internet Explorer 11
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6389
Title:
Hyper-V vSMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6389
CVE-2019-0786
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate vSMB packet data. An attacker who successfully exploited these vulnerabilities could execute arbitrary code on a target operating system. To exploit these vulnerabilities, an attacker running inside a virtual machine could run a specially crafted application that could cause the Hyper-V host operating system to execute arbitrary code. The update addresses the vulnerabilities by correcting how Windows Hyper-V validates vSMB packet data.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6354
Title:
Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6354
CVE-2019-0720
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V Network Switch on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Windows Hyper-V Network Switch validates guest operating system network traffic.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6489
Title:
Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6489
CVE-2019-1230
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows Hyper-V Network Switch on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. An attacker who successfully exploited the vulnerability could gain access to information on the Hyper-V host operating system. The security update addresses the vulnerability by correcting how the Windows Hyper-V Network Switch validates guest operating system user input.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6514
Title:
HTTP/2 Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6514
CVE-2019-9514
Severity:
High
Description:
A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests. An attacker who successfully exploited the vulnerability could create a denial of service condition, causing the target system to become unresponsive. To exploit this vulnerability, an unauthenticated attacker could send a specially crafted HTTP packet to a target system, causing the affected system to become nonresponsive. The update addresses the vulnerability by modifying how the Windows HTTP protocol stack handles HTTP/2 requests. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate user rights.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6366
Title:
HTTP/2 Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6366
CVE-2019-9513
Severity:
High
Description:
A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests. An attacker who successfully exploited the vulnerability could create a denial of service condition, causing the target system to become unresponsive. To exploit this vulnerability, an unauthenticated attacker could send a specially crafted HTTP packet to a target system, causing the affected system to become nonresponsive. The update addresses the vulnerability by modifying how the Windows HTTP protocol stack handles HTTP/2 requests. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate user rights.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6430
Title:
HTTP/2 Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6430
CVE-2019-9511
Severity:
High
Description:
A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests. An attacker who successfully exploited the vulnerability could create a denial of service condition, causing the target system to become unresponsive. To exploit this vulnerability, an unauthenticated attacker could send a specially crafted HTTP packet to a target system, causing the affected system to become nonresponsive. The update addresses the vulnerability by modifying how the Windows HTTP protocol stack handles HTTP/2 requests. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate user rights.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6460
Title:
HTTP/2 Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6460
CVE-2019-9518
Severity:
High
Description:
A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests. An attacker who successfully exploited the vulnerability could create a denial of service condition, causing the target system to become unresponsive. To exploit this vulnerability, an unauthenticated attacker could send a specially crafted HTTP packet to a target system, causing the affected system to become nonresponsive. The update addresses the vulnerability by modifying how the Windows HTTP protocol stack handles HTTP/2 requests. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate user rights.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6610
Title:
HTTP/2 Server Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:6610
CVE-2019-9512
Severity:
High
Description:
A denial of service vulnerability exists in the HTTP/2 protocol stack (HTTP.sys) when HTTP.sys improperly parses specially crafted HTTP/2 requests. An attacker who successfully exploited the vulnerability could create a denial of service condition, causing the target system to become unresponsive. To exploit this vulnerability, an unauthenticated attacker could send a specially crafted HTTP packet to a target system, causing the affected system to become nonresponsive. The update addresses the vulnerability by modifying how the Windows HTTP protocol stack handles HTTP/2 requests. Note that the denial of service vulnerability would not allow an attacker to execute code or to elevate user rights.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6362
Title:
GDI+ Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6362
CVE-2019-1102
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message. In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file. The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6447
Title:
GDI+ Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6447
CVE-2019-0853
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message. In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file. The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6609
Title:
GDI+ Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6609
CVE-2019-0903
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message. In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file. The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6567
Title:
DirectX Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6567
CVE-2019-1216
Severity:
Low
Description:
An information disclosure vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6463
Title:
DirectX Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6463
CVE-2019-0837
Severity:
Low
Description:
An information disclosure vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6406
Title:
DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6406
CVE-2019-1284
Severity:
High
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6443
Title:
DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6443
CVE-2019-0999
Severity:
High
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6459
Title:
DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6459
CVE-2019-1018
Severity:
High
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6638
Title:
DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6638
CVE-2019-1176
Severity:
High
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6491
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6491
CVE-2019-1121
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6526
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6526
CVE-2019-1118
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6551
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6551
CVE-2019-1124
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6686
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6686
CVE-2019-1119
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6410
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6410
CVE-2019-1128
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6415
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6415
CVE-2019-1127
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6421
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6421
CVE-2019-1122
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6454
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6454
CVE-2019-1123
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6623
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6623
CVE-2019-1117
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6657
Title:
DirectWrite Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6657
CVE-2019-1120
Severity:
High
Description:
A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6528
Title:
DirectWrite Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6528
CVE-2019-1244
Severity:
Medium
Description:
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6549
Title:
DirectWrite Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6549
CVE-2019-1245
Severity:
Medium
Description:
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6566
Title:
DirectWrite Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6566
CVE-2019-1251
Severity:
Low
Description:
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6570
Title:
DirectWrite Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6570
CVE-2019-1097
Severity:
Low
Description:
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6622
Title:
DirectWrite Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6622
CVE-2019-1093
Severity:
Low
Description:
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6483
Title:
ADFS Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6483
CVE-2019-0975
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Active Directory Federation Services (ADFS) improperly updates its list of banned IP addresses. To exploit this vulnerability, an attacker would have to convince a victim ADFS administrator to update the list of banned IP addresses. This security update corrects how ADFS updates its list of banned IP addresses.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6359
Title:
ADFS Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6359
CVE-2019-1126
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Active Directory Federation Services (ADFS) which could allow an attacker to bypass the extranet lockout policy. To exploit this vulnerability, an attacker could run a specially crafted application, which would allow an attacker to launch a password brute-force attack or cause account lockouts in Active Directory. This security update corrects how ADFS handles external authentication requests.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6689
Title:
ActiveX Data Objects (ADO) Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6689
CVE-2019-0888
Severity:
High
Description:
A remote code execution vulnerability exists in the way that ActiveX Data Objects (ADO) handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with the victim user’s privileges. An attacker could craft a website that exploits the vulnerability and then convince a victim user to visit the website. The security update addresses the vulnerability by modifying how ActiveX Data Objects handle objects in memory.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6510
Title:
Active Directory Federation Services XSS Vulnerability
Type:
Software
Bulletins:
CISEC:6510
CVE-2019-1273
Severity:
Low
Description:
A cross-site-scripting (XSS) vulnerability exists when Active Directory Federation Services (ADFS) does not properly sanitize certain error messages. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected ADFS server. The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run scripts in the security context of the current user. The attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the ADFS site on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user. The security update addresses the vulnerability by helping to ensure that ADFS error handling properly sanitizes error messages.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CISEC:6385
Title:
Active Directory Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6385
CVE-2019-0683
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Active Directory Forest trusts due to a default setting that lets an attacker in the trusting forest request delegation of a TGT for an identity from the trusted forest. To exploit this vulnerability, an attacker would first need to compromise an Active Directory forest. An attacker who successfully exploited this vulnerability could request delegation of a TGT for an identity from the trusted forest. This update addresses the vulnerability by ensuring new Active Directory Forest trusts disable TGT delegation by default. The update does not change existing TGT delegation configurations.
Applies to:
Created:
2019-12-06
Updated:
2024-01-17

ID:
CVE-2019-13962
Title:
VLC avcodec picture copy heap-buffer-overflow
Type:
Software
Bulletins:
CVE-2019-13962
Severity:
High
Description:
lavc_CopyPicture in modules/codec/avcodec/video.c in VideoLAN VLC media player through 3.0.7 has a heap-based buffer over-read because it does not properly validate the width and height."
Applies to:
VLC
Created:
2019-07-26
Updated:
2024-01-17

ID:
CISEC:5972
Title:
Windows VBScript Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5972
CVE-2018-8544
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5996
Title:
Windows Theme API Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5996
CVE-2018-8413
Severity:
High
Description:
A remote code execution vulnerability exists when "Windows Theme API" does not properly decompress files. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. To exploit the vulnerability, a victim user must open a specially crafted file. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and then convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force a user to visit the website. Instead, an attacker would have to convince a user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The security update addresses the vulnerability by helping to ensure that "Windows Theme API" properly decompresses files.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5926
Title:
Windows TCP/IP Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5926
CVE-2018-8493
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows TCP/IP stack improperly handles fragmented IP packets. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to send specially crafted fragmented IP packets to a remote Windows computer. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows TCP/IP stack handles fragmented IP packets.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5968
Title:
Windows Subsystem for Linux Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5968
CVE-2019-0553
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Subsystem for Linux improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. A attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5986
Title:
Windows Storage Services Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5986
CVE-2018-0983
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Storage Services improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how Storage Services handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5935
Title:
Windows Storage Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5935
CVE-2019-0659
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the Storage Services handles file operations.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5980
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5980
CVE-2019-0630
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit the vulnerability, in most situations, an authenticated attacker could send a specially crafted packet to a targeted SMBv2 server. The security update addresses the vulnerability by correcting how SMBv2 handles these specially crafted requests.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5920
Title:
Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5920
CVE-2019-0633
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 2.0 (SMBv2) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit the vulnerability, in most situations, an authenticated attacker could send a specially crafted packet to a targeted SMBv2 server. The security update addresses the vulnerability by correcting how SMBv2 handles these specially crafted requests.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6005
Title:
Windows Shell Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6005
CVE-2018-8495
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Shell improperly handles URIs. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge, and then convince a user to view the website. The attack requires specific user interaction which an attacker would need to trick the user into performing. There is no way an attacker could exploit the vulnerability without the user performing the specific action. The security update addresses the vulnerability by modifying how Windows Shell handles URIs.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5994
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5994
CVE-2019-0627
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerability by correcting how Windows validates User Mode Code Integrity policies.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5997
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5997
CVE-2018-8549
Severity:
Low
Description:
A security feature bypass exists when Windows incorrectly validates kernel driver signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed drivers into the kernel. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed drivers from being loaded by the kernel. The update addresses the vulnerability by correcting how Windows validates kernel driver signatures.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5919
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5919
CVE-2019-0632
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerability by correcting how Windows validates User Mode Code Integrity policies.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5924
Title:
Windows Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5924
CVE-2019-0631
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Windows which could allow an attacker to bypass Device Guard. An attacker who successfully exploited this vulnerability could circumvent a User Mode Code Integrity (UMCI) policy on the machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then run a malicious program. The update addresses the vulnerability by correcting how Windows validates User Mode Code Integrity policies.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5923
Title:
Windows Search Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5923
CVE-2018-8450
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Search handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit the vulnerability, the attacker could send specially crafted messages to the Windows Search service. An attacker with access to a target computer could exploit this vulnerability to elevate privileges and take control of the computer. Additionally, in an enterprise scenario, a remote authenticated attacker could remotely trigger the vulnerability through an SMB connection and then take control of a target computer. The security update addresses the vulnerability by correcting how Windows Search handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5984
Title:
Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5984
CVE-2019-0570
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5948
Title:
Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5948
CVE-2018-8475
Severity:
Medium
Description:
A remote code execution vulnerability exists when Windows does not properly handle specially crafted image files. An attacker who successfully exploited the vulnerability could execute arbitrary code. To exploit the vulnerability, an attacker would have to convince a user to download an image file. The update addresses the vulnerability by properly handling image files.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5918
Title:
Windows Registry Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5918
CVE-2018-8410
Severity:
High
Description:
An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5929
Title:
Windows Media Player Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5929
CVE-2018-8481
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Media Player improperly discloses file information. Successful exploitation of the vulnerability could allow an attacker to determine the presence of files on disk. To exploit the vulnerability, a user would have to open a specially crafted hyperlink. The update addresses the vulnerability by changing the way Windows Media Player discloses file information.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5932
Title:
Windows Media Player Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5932
CVE-2018-8482
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Media Player improperly discloses file information. Successful exploitation of the vulnerability could allow an attacker to determine the presence of files on disk. To exploit the vulnerability, a user would have to open a specially crafted hyperlink. The update addresses the vulnerability by changing the way Windows Media Player discloses file information.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5946
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5946
CVE-2019-0549
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5947
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5947
CVE-2018-8330
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5965
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5965
CVE-2019-0661
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5981
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5981
CVE-2018-8477
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5992
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5992
CVE-2019-0569
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6015
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6015
CVE-2019-0554
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6020
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6020
CVE-2018-8621
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5917
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5917
CVE-2018-8408
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5921
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5921
CVE-2019-0536
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5930
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5930
CVE-2018-8622
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5944
Title:
Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5944
CVE-2019-0621
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6016
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6016
CVE-2019-0656
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5928
Title:
Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5928
CVE-2018-8497
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5937
Title:
Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5937
CVE-2019-0636
Severity:
Low
Description:
An information vulnerability exists when Windows improperly discloses file information. Successful exploitation of the vulnerability could allow the attacker to read the contents of files on disk. To exploit the vulnerability, an attacker would have to log onto an affected system and run a specially crafted application. The update addresses the vulnerability by changing the way Windows discloses file information.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5950
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5950
CVE-2018-8489
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5956
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5956
CVE-2019-0551
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5958
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5958
CVE-2019-0550
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6004
Title:
Windows Hyper-V Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6004
CVE-2018-8490
Severity:
High
Description:
A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker could run a specially crafted application on a guest operating system that could cause the Hyper-V host operating system to execute arbitrary code. An attacker who successfully exploited the vulnerability could execute arbitrary code on the host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5931
Title:
Windows Hyper-V Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5931
CVE-2019-0635
Severity:
Medium
Description:
An information disclosure vulnerability exists when Windows Hyper-V on a host operating system fails to properly validate input from an authenticated user on a guest operating system. To exploit the vulnerability, an attacker on a guest operating system could run a specially crafted application that could cause the Hyper-V host operating system to disclose memory information. An attacker who successfully exploited the vulnerability could gain access to information on the Hyper-V host operating system. The security update addresses the vulnerability by correcting how Hyper-V validates guest operating system user input.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5961
Title:
Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5961
CVE-2018-8437
Severity:
Medium
Description:
A denial of service vulnerability exists when Microsoft Hyper-V Network Switch on a host server fails to properly validate input from a privileged user on a guest operating system. An attacker who successfully exploited the vulnerability could cause the host server to crash. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application that causes a host machine to crash. The update addresses the vulnerability by modifying how virtual machines access the Hyper-V Network Switch.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5951
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5951
CVE-2019-0616
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5964
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5964
CVE-2019-0615
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5974
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5974
CVE-2019-0660
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5975
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5975
CVE-2019-0619
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5976
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5976
CVE-2019-0664
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5998
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5998
CVE-2018-8595
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5940
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5940
CVE-2019-0602
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5941
Title:
Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5941
CVE-2018-8596
Severity:
Medium
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5973
Title:
Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5973
CVE-2018-8468
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows that allows a sandbox escape. An attacker who successfully exploited the vulnerability could use the sandbox escape to elevate privileges on an affected system. This vulnerability by itself does not allow arbitrary code execution. However, the vulnerability could allow arbitrary code to run if an attacker uses it in combination with another vulnerability, such as a remote code execution vulnerability or another elevation of privilege vulnerability, that can leverage the elevated privileges when code execution is attempted. The security update addresses the vulnerability by correcting how Windows parses files.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5991
Title:
Windows Elevation Of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5991
CVE-2018-8592
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows 10 version 1809 when installed from physical media (USB, DVD, etc.) with the “keep nothing” option selected during installation. Successful exploitation of the vulnerability could allow an attacker to gain local access to an affected system. To exploit the vulnerability, an attacker would need physical access to the console of the affected system. The update addresses the vulnerability by changing built-in account behavior after the setup process completes. For recommendations on managing the local administrator accounts, please see Implementing Least-Privilege Administrative Models
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5988
Title:
Windows DNS Server Heap Overflow Vulnerability
Type:
Software
Bulletins:
CISEC:5988
CVE-2018-8626
Severity:
High
Description:
A remote code execution vulnerability exists in Windows Domain Name System (DNS) servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this vulnerability. To exploit the vulnerability, an unauthenticated attacker could send malicious requests to a Windows DNS server. The update addresses the vulnerability by modifying how Windows DNS servers handle requests.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5957
Title:
Windows DHCP Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5957
CVE-2019-0626
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP server. An attacker who successfully exploited the vulnerability could run arbitrary code on the DHCP server. To exploit the vulnerability, an attacker could send a specially crafted packet to a DHCP server. The security update addresses the vulnerability by correcting how DHCP servers handle network packets.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6011
Title:
Windows DHCP Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6011
CVE-2019-0547
Severity:
High
Description:
A memory corruption vulnerability exists in the Windows DHCP client when an attacker sends specially crafted DHCP responses to a client. An attacker who successfully exploited the vulnerability could run arbitrary code on the client machine. To exploit the vulnerability, an attacker could send a specially crafted DHCP responses to a client. The security update addresses the vulnerability by correcting how Windows DHCP clients handle certain DHCP responses.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5915
Title:
Windows Deployment Services TFTP Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5915
CVE-2018-8476
Severity:
High
Description:
A remote code execution vulnerability exists in the way that Windows Deployment Services TFTP Server handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attacker could create a specially crafted request, causing Windows to execute arbitrary code with elevated permissions. The security update addresses the vulnerability by correcting how Windows Deployment Services TFTP Server handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5967
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5967
CVE-2018-8205
Severity:
Medium
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5916
Title:
Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5916
CVE-2018-8649
Severity:
Medium
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5970
Title:
Windows Defender Firewall Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5970
CVE-2019-0637
Severity:
Medium
Description:
A security feature bypass vulnerability exists when Windows Defender Firewall incorrectly applies firewall profiles to cellular network connections. This vulnerability occurs when Windows is connected to both an ethernet network and a cellular network. An attacker would have no way to trigger this vulnerability remotely, and this vulnerability by itself does not allow Windows to be exploited. This update addresses the behavior by correcting how Windows Defender Firewall handles firewall profiles when ethernet and cellular network connections are both present.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5977
Title:
Windows Data Sharing Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5977
CVE-2019-0572
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Data Sharing Service handles file operations.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6009
Title:
Windows Data Sharing Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6009
CVE-2019-0571
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Data Sharing Service handles file operations.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6014
Title:
Windows Data Sharing Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6014
CVE-2019-0574
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Data Sharing Service handles file operations.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5938
Title:
Windows Data Sharing Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5938
CVE-2019-0573
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when the Windows Data Sharing Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Data Sharing Service handles file operations.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5966
Title:
Windows COM Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5966
CVE-2019-0552
Severity:
Medium
Description:
An elevation of privilege exists in Windows COM Desktop Broker. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how Windows COM Desktop Broker processes interface requests.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5922
Title:
Windows COM Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5922
CVE-2018-8550
Severity:
Medium
Description:
An elevation of privilege exists in Windows COM Aggregate Marshaler. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how Windows COM Marshaler processes interface requests.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5983
Title:
Windows Code Integrity Module Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5983
CVE-2018-1040
Severity:
Medium
Description:
A denial of service vulnerability exists in the way that the Windows Code Integrity Module performs hashing. An attacker who successfully exploited the vulnerability could cause a system to stop responding. Note that the denial of service condition would not allow an attacker to execute code or to elevate user privileges. However, the denial of service condition could prevent authorized users from using system resources. An attacker could host a specially crafted file in a website or SMB share. The attacker could also take advantage of compromised websites, or websites that accept or host user-provided content or advertisements, by adding specially crafted content that could exploit the vulnerability. However, in all cases an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically via an enticement in email or instant message, or by getting them to open an email attachment. The security update addresses the vulnerability by modifying how the Code Integrity Module performs hashing.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5979
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5979
CVE-2018-8565
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5993
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5993
CVE-2019-0628
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6003
Title:
Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6003
CVE-2018-8637
Severity:
Low
Description:
An information disclosure vulnerability exists in Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass. An attacker who successfully exploited this vulnerability could retrieve the memory address of a kernel object. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5989
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5989
CVE-2018-8641
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5990
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5990
CVE-2019-0623
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6008
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6008
CVE-2018-0977
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6021
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6021
CVE-2018-8639
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5934
Title:
Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5934
CVE-2018-8562
Severity:
High
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6012
Title:
Remote Procedure Call runtime Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6012
CVE-2018-8514
Severity:
Low
Description:
An information disclosure vulnerability exists when Remote Procedure Call runtime improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Remote Procedure Call runtime i initializes objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5927
Title:
Remote Procedure Call runtime Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5927
CVE-2018-8407
Severity:
Low
Description:
An information disclosure vulnerability exists when Remote Procedure Call runtime improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Remote Procedure Call runtime i initializes objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5995
Title:
MS XML Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5995
CVE-2018-8420
Severity:
High
Description:
A remote code execution vulnerability exists when the Microsoft XML Core Services MSXML parser processes user input. An attacker who successfully exploited the vulnerability could run malicious code remotely to take control of the user’s system. To exploit the vulnerability, an attacker could host a specially crafted website designed to invoke MSXML through a web browser. However, an attacker would have no way to force a user to visit such a website. Instead, an attacker would typically have to convince a user to either click a link in an email message or instant message that would then take the user to the website. When Internet Explorer parses the XML content, an attacker could run malicious code remotely to take control of the user’s system. The update addresses the vulnerability by correcting how the MSXML parser processes user input.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5969
Title:
Microsoft XmlDocument Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5969
CVE-2019-0555
Severity:
Medium
Description:
An elevation of privilege vulnerability exists in the Microsoft XmlDocument class that could allow an attacker to escape from the AppContainer sandbox in the browser. An attacker who successfully exploited this vulnerability could gain elevated privileges and break out of the Edge AppContainer sandbox. The vulnerability by itself does not allow arbitrary code to run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (for example a remote code execution vulnerability and another elevation of privilege vulnerability) to take advantage of the elevated privileges when running. The security update addresses the vulnerability by modifying how the Microsoft XmlDocument class enforces sandboxing.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5943
Title:
Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5943
CVE-2019-0543
Severity:
Medium
Description:
An elevation of privilege vulnerability exists when Windows improperly handles authentication requests. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way Windows handles authentication requests.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5982
Title:
Microsoft Text-To-Speech Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5982
CVE-2018-8634
Severity:
High
Description:
A remote code execution vulnerability exists in Windows where Microsoft text-to-speech fails to properly handle objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The security update addresses the vulnerability by correcting how the Microsoft text-to-speech handles objects in the memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5999
Title:
Microsoft JScript Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:5999
CVE-2018-8417
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Microsoft JScript that could allow an attacker to bypass Device Guard. To exploit the vulnerability, an attacker would first have to access the local machine, and run a specially crafted application to create arbitrary COM objects. The update addresses the vulnerability by correcting how Microsoft JScript manages COM object creation.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5945
Title:
Microsoft JET Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5945
CVE-2018-8423
Severity:
High
Description:
A remote code execution vulnerability exists in the Microsoft JET Database Engine. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. To exploit the vulnerability, a user must open/import a specially crafted Microsoft JET Database Engine file. In an email attack scenario, an attacker could exploit the vulnerability by sending a specially crafted file to the user, and then convince the user to open the file. The security update addresses the vulnerability by modifying how the Microsoft JET Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5978
Title:
Microsoft Graphics Components Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5978
CVE-2018-8553
Severity:
High
Description:
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6013
Title:
Microsoft Filter Manager Elevation Of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6013
CVE-2018-8333
Severity:
Medium
Description:
An Elevation of Privilege vulnerability exists in Filter Manager when it improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute elevated code and take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit the vulnerability, an attacker would first have to log on to a target system and then delete a specially crafted file. The security update addresses the vulnerability by correcting how Filter Manager handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6007
Title:
Microsoft Cortana Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:6007
CVE-2018-8253
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft Cortana allows arbitrary website browsing on the lockscreen. An attacker who successfully exploited the vulnerability could steal browser stored passwords or log on to websites as another user. To exploit the vulnerability, an attacker would require physical access to the console and the system must have Microsoft Cortana assistance enabled. The security update addresses the vulnerability by preventing Microsoft Cortana from allowing arbitrary website browsing on the lockscreen.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5952
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5952
CVE-2019-0599
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5953
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5953
CVE-2019-0584
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5955
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5955
CVE-2019-0596
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5959
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5959
CVE-2019-0575
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5960
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5960
CVE-2019-0595
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5963
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5963
CVE-2019-0598
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5985
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5985
CVE-2019-0578
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6000
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6000
CVE-2019-0583
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6001
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6001
CVE-2019-0580
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6006
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6006
CVE-2019-0577
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6010
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6010
CVE-2019-0581
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5914
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5914
CVE-2019-0625
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5925
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5925
CVE-2019-0579
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5939
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5939
CVE-2019-0597
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5942
Title:
Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:5942
CVE-2019-0576
Severity:
High
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5954
Title:
HID Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5954
CVE-2019-0601
Severity:
Low
Description:
An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victim’s system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the HID component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5987
Title:
HID Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:5987
CVE-2019-0600
Severity:
Low
Description:
An information disclosure vulnerability exists when the Human Interface Devices (HID) component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the victim’s system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the HID component handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6018
Title:
GDI+ Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6018
CVE-2019-0618
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message. In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file. The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6019
Title:
GDI+ Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:6019
CVE-2019-0662
Severity:
High
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message. In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file. The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6002
Title:
DirectX Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:6002
CVE-2018-8638
Severity:
Low
Description:
An information disclosure vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5949
Title:
DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5949
CVE-2018-8554
Severity:
High
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5962
Title:
DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5962
CVE-2018-8485
Severity:
High
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:6017
Title:
Device Guard Code Integrity Policy Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:6017
CVE-2018-8492
Severity:
Medium
Description:
A security feature bypass vulnerability exists in Device Guard that could allow an attacker to inject malicious code into a Windows PowerShell session. An attacker who successfully exploited this vulnerability could inject code into a trusted PowerShell process to bypass the Device Guard Code Integrity policy on the local machine. To exploit the vulnerability, an attacker would first have to access the local machine, and then inject malicious code into a script that is trusted by the Code Integrity policy. The injected code would then run with the same trust level as the script and bypass the Code Integrity policy. The update addresses the vulnerability by correcting how PowerShell exposes functions and processes user supplied code.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5936
Title:
Cortana Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:5936
CVE-2018-8140
Severity:
Medium
Description:
An Elevation of Privilege vulnerability exists when Cortana retrieves data from user input services without consideration for status. An attacker who successfully exploited the vulnerability could execute commands with elevated permissions. To exploit the vulnerability, an attacker would require physical/console access and the system would need to have Cortana assistance enabled. The security update addresses the vulnerability by ensuring Cortana considers status when retrieves information from input services.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5971
Title:
Connected User Experiences and Telemetry Service Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:5971
CVE-2018-8612
Severity:
Low
Description:
A Denial Of Service vulnerability exists when Connected User Experiences and Telemetry Service fails to validate certain function values. An attacker who successfully exploited this vulnerability could deny dependent security feature functionality. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service validates certain function values.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5933
Title:
Active Directory Federation Services XSS Vulnerability
Type:
Software
Bulletins:
CISEC:5933
CVE-2018-8547
Severity:
Low
Description:
A cross-site-scripting (XSS) vulnerability exists when an open source customization for Microsoft Active Directory Federation Services (AD FS) does not properly sanitize a specially crafted web request to an affected AD FS server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected AD FS server. The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run scripts in the security context of the current user. The attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the AD FS site on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user. The security update addresses the vulnerability by helping to ensure that the open source customization for AD FS properly sanitizes web requests.
Applies to:
Created:
2019-03-29
Updated:
2024-01-17

ID:
CISEC:5860
Title:
Vulnerability
Type:
Software
Bulletins:
CISEC:5860
CVE-2018-8611
Severity:
High
Description:
CVE-2018-8611 | Windows Kernel Elevation of Privilege Vulnerability
Applies to:
Created:
2019-01-11
Updated:
2024-01-17