Skip to content

Commit f9abce7

Browse files
Advisory Database Sync
1 parent 15ca792 commit f9abce7

88 files changed

Lines changed: 1111 additions & 166 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/unreviewed/2022/05/GHSA-2h53-ffj5-hg3q/GHSA-2h53-ffj5-hg3q.json

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2h53-ffj5-hg3q",
4-
"modified": "2022-05-24T16:53:33Z",
4+
"modified": "2026-02-20T21:31:10Z",
55
"published": "2022-05-24T16:53:33Z",
66
"aliases": [
77
"CVE-2019-1199"
88
],
99
"details": "A remote code execution vulnerability exists in Microsoft Outlook when the software fails to properly handle objects in memory, aka 'Microsoft Outlook Memory Corruption Vulnerability'.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -20,7 +25,9 @@
2025
}
2126
],
2227
"database_specific": {
23-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-787"
30+
],
2431
"severity": "HIGH",
2532
"github_reviewed": false,
2633
"github_reviewed_at": null,

advisories/unreviewed/2022/05/GHSA-2m99-pq2j-5j4f/GHSA-2m99-pq2j-5j4f.json

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2m99-pq2j-5j4f",
4-
"modified": "2022-05-24T16:53:28Z",
4+
"modified": "2026-02-20T21:31:09Z",
55
"published": "2022-05-24T16:53:28Z",
66
"aliases": [
77
"CVE-2019-1145"
88
],
99
"details": "A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Microsoft Graphics Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1144, CVE-2019-1149, CVE-2019-1150, CVE-2019-1151, CVE-2019-1152.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,7 +29,9 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-119"
34+
],
2835
"severity": "HIGH",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,

advisories/unreviewed/2022/05/GHSA-2r32-rq8q-r57h/GHSA-2r32-rq8q-r57h.json

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-2r32-rq8q-r57h",
4-
"modified": "2022-05-24T16:53:29Z",
4+
"modified": "2026-02-20T21:31:09Z",
55
"published": "2022-05-24T16:53:29Z",
66
"aliases": [
77
"CVE-2019-1152"
88
],
99
"details": "A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts, aka 'Microsoft Graphics Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1144, CVE-2019-1145, CVE-2019-1149, CVE-2019-1150, CVE-2019-1151.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -24,7 +29,9 @@
2429
}
2530
],
2631
"database_specific": {
27-
"cwe_ids": [],
32+
"cwe_ids": [
33+
"CWE-787"
34+
],
2835
"severity": "HIGH",
2936
"github_reviewed": false,
3037
"github_reviewed_at": null,

advisories/unreviewed/2022/05/GHSA-32j3-hv3j-q9qq/GHSA-32j3-hv3j-q9qq.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-32j3-hv3j-q9qq",
4-
"modified": "2022-05-24T16:53:30Z",
4+
"modified": "2026-02-20T21:31:09Z",
55
"published": "2022-05-24T16:53:30Z",
66
"aliases": [
77
"CVE-2019-1161"
88
],
99
"details": "An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/05/GHSA-373m-h49w-9x43/GHSA-373m-h49w-9x43.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-373m-h49w-9x43",
4-
"modified": "2022-05-24T16:53:29Z",
4+
"modified": "2026-02-20T21:31:09Z",
55
"published": "2022-05-24T16:53:29Z",
66
"aliases": [
77
"CVE-2019-1147"
88
],
99
"details": "A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka 'Jet Database Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1146, CVE-2019-1155, CVE-2019-1156, CVE-2019-1157.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/05/GHSA-4x8m-3wcx-gv8x/GHSA-4x8m-3wcx-gv8x.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-4x8m-3wcx-gv8x",
4-
"modified": "2022-05-24T16:53:30Z",
4+
"modified": "2026-02-20T21:31:09Z",
55
"published": "2022-05-24T16:53:30Z",
66
"aliases": [
77
"CVE-2019-1169"
88
],
99
"details": "An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/05/GHSA-534v-m7q8-9qgf/GHSA-534v-m7q8-9qgf.json

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-534v-m7q8-9qgf",
4-
"modified": "2022-05-24T16:53:34Z",
4+
"modified": "2026-02-20T21:31:11Z",
55
"published": "2022-05-24T16:53:34Z",
66
"aliases": [
77
"CVE-2019-1206"
88
],
99
"details": "A memory corruption vulnerability exists in the Windows Server DHCP service when an attacker sends specially crafted packets to a DHCP failover server, aka 'Windows DHCP Server Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-1212.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -20,7 +25,9 @@
2025
}
2126
],
2227
"database_specific": {
23-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-787"
30+
],
2431
"severity": "HIGH",
2532
"github_reviewed": false,
2633
"github_reviewed_at": null,

advisories/unreviewed/2022/05/GHSA-5qmr-w63r-99q4/GHSA-5qmr-w63r-99q4.json

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-5qmr-w63r-99q4",
4-
"modified": "2022-05-24T16:53:33Z",
4+
"modified": "2026-02-20T21:31:10Z",
55
"published": "2022-05-24T16:53:33Z",
66
"aliases": [
77
"CVE-2019-1192"
88
],
99
"details": "A security feature bypass vulnerability exists when Microsoft browsers improperly handle requests of different origins, aka 'Microsoft Browsers Security Feature Bypass Vulnerability'.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{
@@ -20,7 +25,9 @@
2025
}
2126
],
2227
"database_specific": {
23-
"cwe_ids": [],
28+
"cwe_ids": [
29+
"CWE-863"
30+
],
2431
"severity": "MODERATE",
2532
"github_reviewed": false,
2633
"github_reviewed_at": null,

advisories/unreviewed/2022/05/GHSA-78g9-438v-4f34/GHSA-78g9-438v-4f34.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-78g9-438v-4f34",
4-
"modified": "2022-05-24T16:53:34Z",
4+
"modified": "2026-02-20T21:31:11Z",
55
"published": "2022-05-24T16:53:34Z",
66
"aliases": [
77
"CVE-2019-1211"
88
],
99
"details": "An elevation of privilege vulnerability exists in Git for Visual Studio when it improperly parses configuration files, aka 'Git for Visual Studio Elevation of Privilege Vulnerability'.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

advisories/unreviewed/2022/05/GHSA-78hr-8953-5gh6/GHSA-78hr-8953-5gh6.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,18 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-78hr-8953-5gh6",
4-
"modified": "2022-05-24T16:53:31Z",
4+
"modified": "2026-02-20T21:31:10Z",
55
"published": "2022-05-24T16:53:31Z",
66
"aliases": [
77
"CVE-2019-1183"
88
],
99
"details": "A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'Windows VBScript Engine Remote Code Execution Vulnerability'.",
10-
"severity": [],
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
1116
"affected": [],
1217
"references": [
1318
{

0 commit comments

Comments
 (0)