LanGuard reports



Supported OVAL Bulletins


More information on 2020 updates



ID:
CISEC:8128
Title:
oval:org.cisecurity:def:8128: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8128
CVE-2020-1557
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8129
Title:
oval:org.cisecurity:def:8129: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:8129
CVE-2020-1492
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8130
Title:
oval:org.cisecurity:def:8130: Windows Print Spooler Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8130
CVE-2020-1337
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8131
Title:
oval:org.cisecurity:def:8131: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:8131
CVE-2020-1478
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8132
Title:
oval:org.cisecurity:def:8132: Windows Radio Manager API Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8132
CVE-2020-1528
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Radio Manager API improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Radio Manager API handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8133
Title:
oval:org.cisecurity:def:8133: Windows Work Folder Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8133
CVE-2020-1552
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Work Folder Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Work Folder Service handles file operations.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8134
Title:
oval:org.cisecurity:def:8134: Windows Speech Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8134
CVE-2020-1522
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Speech Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Speech Runtime handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8135
Title:
oval:org.cisecurity:def:8135: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8135
CVE-2020-1545
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8136
Title:
oval:org.cisecurity:def:8136: Windows RRAS Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8136
CVE-2020-1383
Severity:
Low
Description:
An information disclosure vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system To exploit this vulnerability, an attacker would need to run a specially crafted application against an RPC server which has Routing and Remote Access enabled. Routing and Remote Access is a non-default configuration; systems without it enabled are not vulnerable. The security update addresses the vulnerability by correcting how the Routing and Remote Access service handles requests.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8137
Title:
oval:org.cisecurity:def:8137: Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:8137
CVE-2020-1466
Severity:
Low
Description:
A denial of service vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the RD Gateway service on the target system to stop responding. To exploit this vulnerability, an attacker would need to run a specially crafted application against a server which provides RD Gateway services. The update addresses the vulnerability by correcting how RD Gateway handles connection requests.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8138
Title:
oval:org.cisecurity:def:8138: Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8138
CVE-2020-1587
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Ancillary Function Driver for WinSock improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Ancillary Function Driver for WinSock handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8139
Title:
oval:org.cisecurity:def:8139: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8139
CVE-2020-1540
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8140
Title:
oval:org.cisecurity:def:8140: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8140
CVE-2020-1541
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8141
Title:
oval:org.cisecurity:def:8141: Windows Server Resource Management Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8141
CVE-2020-1475
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the srmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the srmsvc.dll properly handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8142
Title:
oval:org.cisecurity:def:8142: Windows Registry Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8142
CVE-2020-1378
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8143
Title:
oval:org.cisecurity:def:8143: Windows Work Folders Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8143
CVE-2020-1470
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Work Folders Service handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8144
Title:
oval:org.cisecurity:def:8144: Windows CDP User Components Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8144
CVE-2020-1549
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows CDP User Components improperly handle memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CDP User Components handle memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8093
Title:
oval:org.cisecurity:def:8093: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8093
CVE-2020-1543
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8094
Title:
oval:org.cisecurity:def:8094: Windows Hard Link Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8094
CVE-2020-1467
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows handles hard links.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8095
Title:
oval:org.cisecurity:def:8095: Windows Speech Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8095
CVE-2020-1521
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Speech Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Speech Runtime handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8096
Title:
oval:org.cisecurity:def:8096: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:8096
CVE-2020-1477
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8097
Title:
oval:org.cisecurity:def:8097: Windows dnsrslvr.dll Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8097
CVE-2020-1584
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the dnsrslvr.dll properly handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8098
Title:
oval:org.cisecurity:def:8098: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8098
CVE-2020-1535
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8099
Title:
oval:org.cisecurity:def:8099: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8099
CVE-2020-1578
Severity:
Low
Description:
An information disclosure vulnerability exists in the Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the vulnerability could retrieve the memory address of a kernel object. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows kernel handles memory addresses.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8100
Title:
oval:org.cisecurity:def:8100: Windows State Repository Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8100
CVE-2020-1512
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8101
Title:
oval:org.cisecurity:def:8101: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8101
CVE-2020-1417
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8102
Title:
oval:org.cisecurity:def:8102: Windows Network Connection Broker Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8102
CVE-2020-1526
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Network Connection Broker improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Network Connection Broker handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8103
Title:
oval:org.cisecurity:def:8103: Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8103
CVE-2020-1510
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8104
Title:
oval:org.cisecurity:def:8104: Windows Image Acquisition Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8104
CVE-2020-1485
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an authenticated attacker could connect an imaging device (camera, scanner, cellular phone) to an affected system and run a specially crafted application to disclose information. The security update addresses the vulnerability by correcting how the WIA Service handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8105
Title:
oval:org.cisecurity:def:8105: Windows File Server Resource Management Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8105
CVE-2020-1518
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows File Server Resource Management Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows File Server Resource Management Service handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8106
Title:
oval:org.cisecurity:def:8106: Microsoft Graphics Components Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8106
CVE-2020-1562
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8107
Title:
oval:org.cisecurity:def:8107: DirectWrite Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8107
CVE-2020-1577
Severity:
Low
Description:
An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8108
Title:
oval:org.cisecurity:def:8108: Windows Registry Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8108
CVE-2020-1377
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8109
Title:
oval:org.cisecurity:def:8109: Windows Image Acquisition Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8109
CVE-2020-1474
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an authenticated attacker could connect an imaging device (camera, scanner, cellular phone) to an affected system and run a specially crafted application to disclose information. The security update addresses the vulnerability by correcting how the WIA Service handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8110
Title:
oval:org.cisecurity:def:8110: Microsoft Graphics Components Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8110
CVE-2020-1561
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8111
Title:
oval:org.cisecurity:def:8111: Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8111
CVE-2020-1480
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how GDI handles objects in memory and by preventing instances of unintended user-mode privilege elevation.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8112
Title:
oval:org.cisecurity:def:8112: Media Foundation Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8112
CVE-2020-1487
Severity:
Low
Description:
An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log onto an affected system and open a specially crafted file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The update addresses the vulnerability by correcting how Media Foundation handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8113
Title:
oval:org.cisecurity:def:8113: Windows CSC Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8113
CVE-2020-1513
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CSC Service handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8114
Title:
oval:org.cisecurity:def:8114: Netlogon Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8114
CVE-2020-1472
Severity:
Low
Description:
An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. To exploit the vulnerability, an unauthenticated attacker would be required to use MS-NRPC to connect to a domain controller to obtain domain administrator access. Microsoft is addressing the vulnerability in a phased two-part rollout. These updates address the vulnerability by modifying how Netlogon handles the usage of Netlogon secure channels. For guidelines on how to manage the changes required for this vulnerability and more information on the phased rollout, see How to manage the changes in Netlogon secure channel connections associated with CVE-2020-1472. When the second phase of Windows updates become available in Q1 2021, customers will be notified via a revision to this security vulnerability. If you wish to be notified when these updates are released, we recommend that you register for the security notifications mailer to be alerted of content changes to this advisory. See Microsoft Technical Security Notifications.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8115
Title:
oval:org.cisecurity:def:8115: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8115
CVE-2020-1546
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8116
Title:
oval:org.cisecurity:def:8116: Windows File Server Resource Management Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8116
CVE-2020-1517
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows File Server Resource Management Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows File Server Resource Management Service handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8117
Title:
oval:org.cisecurity:def:8117: Windows Remote Access Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8117
CVE-2020-1537
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Remote Access improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Remote Access properly handles file operations.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8118
Title:
oval:org.cisecurity:def:8118: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8118
CVE-2020-1564
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8119
Title:
oval:org.cisecurity:def:8119: Windows Speech Shell Components Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8119
CVE-2020-1524
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Speech Shell Components improperly handle memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Speech Shell Components handle memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8120
Title:
oval:org.cisecurity:def:8120: Windows CSC Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8120
CVE-2020-1489
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CSC Service handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8121
Title:
oval:org.cisecurity:def:8121: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8121
CVE-2020-1558
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8122
Title:
oval:org.cisecurity:def:8122: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8122
CVE-2020-1536
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8123
Title:
oval:org.cisecurity:def:8123: Windows Work Folders Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8123
CVE-2020-1516
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Work Folders Service handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8124
Title:
oval:org.cisecurity:def:8124: Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8124
CVE-2020-1511
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service handles file operations.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8125
Title:
oval:org.cisecurity:def:8125: Windows Remote Access Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8125
CVE-2020-1530
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Remote Access improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how Windows Remote Access handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8126
Title:
oval:org.cisecurity:def:8126: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8126
CVE-2020-1565
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the "Public Account Pictures" folder improperly handles junctions. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how Windows handles junctions.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8127
Title:
oval:org.cisecurity:def:8127: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8127
CVE-2020-1473
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8145
Title:
oval:org.cisecurity:def:8145: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8145
CVE-2020-1486
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8146
Title:
oval:org.cisecurity:def:8146: Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8146
CVE-2020-1529
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how GDI handles objects in memory and by preventing instances of unintended user-mode privilege elevation.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8147
Title:
oval:org.cisecurity:def:8147: Windows Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:8147
CVE-2020-1464
Severity:
Low
Description:
A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8148
Title:
oval:org.cisecurity:def:8148: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8148
CVE-2020-1544
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8149
Title:
oval:org.cisecurity:def:8149: Windows Backup Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8149
CVE-2020-1534
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8150
Title:
oval:org.cisecurity:def:8150: Windows CDP User Components Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8150
CVE-2020-1550
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows CDP User Components improperly handle memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CDP User Components handle memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8151
Title:
oval:org.cisecurity:def:8151: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8151
CVE-2020-1551
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8152
Title:
oval:org.cisecurity:def:8152: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8152
CVE-2020-1542
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8153
Title:
oval:org.cisecurity:def:8153: Windows Custom Protocol Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8153
CVE-2020-1527
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Custom Protocol Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Custom Protocol Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8154
Title:
oval:org.cisecurity:def:8154: Windows Media Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8154
CVE-2020-1339
Severity:
Low
Description:
A remote code execution vulnerability exists when Windows Media Audio Codec improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Audio Codec handles objects.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8155
Title:
oval:org.cisecurity:def:8155: Windows WaasMedic Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8155
CVE-2020-1548
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows WaasMedic Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to improperly disclose memory. The security update addresses the vulnerability by correcting how the Windows WaasMedic Service handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8156
Title:
oval:org.cisecurity:def:8156: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:8156
CVE-2020-1554
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8157
Title:
oval:org.cisecurity:def:8157: Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8157
CVE-2020-1488
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files. To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8158
Title:
oval:org.cisecurity:def:8158: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:8158
CVE-2020-1525
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8159
Title:
oval:org.cisecurity:def:8159: Windows Accounts Control Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8159
CVE-2020-1531
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Accounts Control improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Accounts Control handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8160
Title:
oval:org.cisecurity:def:8160: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8160
CVE-2020-1553
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8161
Title:
oval:org.cisecurity:def:8161: Windows UPnP Device Host Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8161
CVE-2020-1519
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows UPnP Device Host handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8167
Title:
oval:org.cisecurity:def:8167: Windows WalletService Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8167
CVE-2020-1556
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8168
Title:
oval:org.cisecurity:def:8168: Windows UPnP Device Host Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8168
CVE-2020-1538
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows UPnP Device Host handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8169
Title:
oval:org.cisecurity:def:8169: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8169
CVE-2020-1547
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8170
Title:
oval:org.cisecurity:def:8170: Windows Font Driver Host Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8170
CVE-2020-1520
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system. The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8171
Title:
oval:org.cisecurity:def:8171: Windows Work Folders Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8171
CVE-2020-1484
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Work Folders Service handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8172
Title:
oval:org.cisecurity:def:8172: Local Security Authority Subsystem Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8172
CVE-2020-1509
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the Local Security Authority Subsystem Service (LSASS) when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause an elevation of privilege on the target system's LSASS service. The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8173
Title:
oval:org.cisecurity:def:8173: Windows Backup Engine Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8173
CVE-2020-1539
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Engine improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Engine handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8174
Title:
oval:org.cisecurity:def:8174: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:8174
CVE-2020-1379
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8195
Title:
oval:org.cisecurity:def:8195: Vulnerability in PostgreSQL
Type:
Software
Bulletins:
CISEC:8195
CVE-2013-1902
Severity:
Low
Description:
PostgreSQL, 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, 8.4.x before 8.4.17, and 8.3.x before 8.3.23 generates insecure temporary files with predictable filenames, which has unspecified impact and attack vectors related to "graphical installers for Linux and Mac OS X."
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8196
Title:
oval:org.cisecurity:def:8196: Vulnerability in PostgreSQL 11.x before 11.3, 10.xbefore 10.8, 9.6.x before 9.6.13, 9.5.x before 9.5.17
Type:
Software
Bulletins:
CISEC:8196
CVE-2019-10130
Severity:
Medium
Description:
A vulnerability was found in PostgreSQL versions 11.x up to excluding 11.3, 10.x up to excluding 10.8, 9.6.x up to, excluding 9.6.13, 9.5.x up to, excluding 9.5.17. PostgreSQL maintains column statistics for tables. Certain statistics, such as histograms and lists of most common values, contain values taken from the column. PostgreSQL does not evaluate row security policies before consulting those statistics during query planning; an attacker can exploit this to read the most common values of certain columns. Affected columns are those for which the attacker has SELECT privilege and for which, in an ordinary query, row-level security prunes the set of rows visible to the attacker.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8197
Title:
oval:org.cisecurity:def:8197: Vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, 8.4.x before 8.4.17, and 8.3.x before 8.3.23
Type:
Software
Bulletins:
CISEC:8197
CVE-2013-1903
Severity:
Low
Description:
PostgreSQL, possibly 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, 8.4.x before 8.4.17, and 8.3.x before 8.3.23 incorrectly provides the superuser password to scripts related to "graphical installers for Linux and Mac OS X," which has unspecified impact and attack vectors.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8198
Title:
oval:org.cisecurity:def:8198: Vulnerability in PostgreSQL 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2
Type:
Software
Bulletins:
CISEC:8198
CVE-2018-1053
Severity:
Low
Description:
In postgresql 9.3.x before 9.3.21, 9.4.x before 9.4.16, 9.5.x before 9.5.11, 9.6.x before 9.6.7 and 10.x before 10.2, pg_upgrade creates file in current working directory containing the output of `pg_dumpall -g` under umask which was in effect when the user invoked pg_upgrade, and not under 0077 which is normally used for other temporary files. This can allow an authenticated attacker to read or modify the one file, which may contain encrypted or unencrypted database passwords.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8199
Title:
oval:org.cisecurity:def:8199: Vulnerability in PostgreSQL 9.3.3 and earlier
Type:
Software
Bulletins:
CISEC:8199
CVE-2014-0067
Severity:
Medium
Description:
The "make check" command for the test suites in PostgreSQL 9.3.3 and earlier does not properly invoke initdb to specify the authentication requirements for a database cluster to be used for the tests, which allows local users to gain privileges by leveraging access to this cluster.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8200
Title:
oval:org.cisecurity:def:8200: Vulnerability in PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23
Type:
Software
Bulletins:
CISEC:8200
CVE-2013-0255
Severity:
Medium
Description:
PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8240
Title:
oval:org.cisecurity:def:8240: Vulnerability in PostgreSQL before 9.5.x before 9.5.2
Type:
Software
Bulletins:
CISEC:8240
CVE-2016-2193
Severity:
Medium
Description:
PostgreSQL before 9.5.x before 9.5.2 does not properly maintain row-security status in cached plans, which might allow attackers to bypass intended access restrictions by leveraging a session that performs queries as more than one role.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8241
Title:
oval:org.cisecurity:def:8241: Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3
Type:
Software
Bulletins:
CISEC:8241
CVE-2014-0065
Severity:
Medium
Description:
Multiple buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, a different vulnerability than CVE-2014-0063.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8242
Title:
oval:org.cisecurity:def:8242: Vulnerability in PostgreSQL before 9.3.15, 9.4.x before 9.4.10, and 9.5.x before 9.5.5
Type:
Software
Bulletins:
CISEC:8242
CVE-2016-7048
Severity:
High
Description:
The interactive installer in PostgreSQL before 9.3.15, 9.4.x before 9.4.10, and 9.5.x before 9.5.5 might allow remote attackers to execute arbitrary code by leveraging use of HTTP to download software.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8243
Title:
oval:org.cisecurity:def:8243: EnterpriseDB Windows installer bundled OpenSSL executes code from unprotected directory
Type:
Software
Bulletins:
CISEC:8243
CVE-2019-10211
Severity:
Low
Description:
When the database server or libpq client library initializes SSL, libeay32.dll attempts to read configuration from a hard-coded directory. Typically, the directory does not exist, but any local user could create it and inject configuration. This configuration can direct OpenSSL to load and execute arbitrary code as the user running a PostgreSQL server or client. Most PostgreSQL client tools and libraries use libpq, and one can encounter this vulnerability by using any of them.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8244
Title:
oval:org.cisecurity:def:8244: Memory errors in the pgcrypto extension in PostgreSQL
Type:
Software
Bulletins:
CISEC:8244
Severity:
Low
Description:
Memory errors in functions in the pgcrypto extension in PostgreSQL before 9.4.1, 9.3.6, 9.2.10, 9.1.15 and 9.0.19.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8245
Title:
oval:org.cisecurity:def:8245: Multiple integer overflows in PostgreSQL
Type:
Software
Bulletins:
CISEC:8245
CVE-2014-0064
Severity:
Medium
Description:
Multiple integer overflows in the path_in and other unspecified functions in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact and attack vectors, which trigger a buffer overflow. NOTE: this identifier has been SPLIT due to different affected versions; use CVE-2014-2669 for the hstore vector.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8162
Title:
oval:org.cisecurity:def:8162: Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8162
CVE-2020-1579
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Function Discovery SSDP Provider handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8163
Title:
oval:org.cisecurity:def:8163: Windows Telephony Server Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8163
CVE-2020-1515
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Telephony Server improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Telephony Server handles memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8164
Title:
oval:org.cisecurity:def:8164: DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8164
CVE-2020-1479
Severity:
Low
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8165
Title:
oval:org.cisecurity:def:8165: Windows Storage Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8165
CVE-2020-1490
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the Storage Services handles file operations.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8166
Title:
oval:org.cisecurity:def:8166: Windows WalletService Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8166
CVE-2020-1533
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8188
Title:
oval:org.cisecurity:def:8188: Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3
Type:
Software
Bulletins:
CISEC:8188
CVE-2014-0063
Severity:
Medium
Description:
Multiple stack-based buffer overflows in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to cause a denial of service (crash) or possibly execute arbitrary code via vectors related to an incorrect MAXDATELEN constant and datetime values involving (1) intervals, (2) timestamps, or (3) timezones, a different vulnerability than CVE-2014-0065.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8189
Title:
oval:org.cisecurity:def:8189: Vulnerability in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4
Type:
Software
Bulletins:
CISEC:8189
CVE-2010-1975
Severity:
Medium
Description:
PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, and 8.4 before 8.4.4 does not properly check privileges during certain RESET ALL operations, which allows remote authenticated users to remove arbitrary parameter settings via a (1) ALTER USER or (2) ALTER DATABASE statement.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8190
Title:
oval:org.cisecurity:def:8190: Vulnerability in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3
Type:
Software
Bulletins:
CISEC:8190
CVE-2017-7484
Severity:
Medium
Description:
It was found that some selectivity estimation functions in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3 did not check user privileges before providing information from pg_statistic, possibly leaking information. An unprivileged attacker could use this flaw to steal some information from tables they are otherwise not allowed to access.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8191
Title:
oval:org.cisecurity:def:8191: Multiple integer overflows in PostgreSQL 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3
Type:
Software
Bulletins:
CISEC:8191
CVE-2014-2669
Severity:
Medium
Description:
Multiple integer overflows in contrib/hstore/hstore_io.c in PostgreSQL 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to have unspecified impact via vectors related to the (1) hstore_recv, (2) hstore_from_arrays, and (3) hstore_from_array functions in contrib/hstore/hstore_io.c; and the (4) hstoreArrayToPairs function in contrib/hstore/hstore_op.c, which triggers a buffer overflow. NOTE: this issue was SPLIT from CVE-2014-0064 because it has a different set of affected versions.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8192
Title:
oval:org.cisecurity:def:8192: Vulnerability in PostgreSQL 11.x before 11.5, 10.x before 10.10, 9.6.x before 9.6.15, 9.5.x before 9.5.19, 9.4.x before 9.4.24
Type:
Software
Bulletins:
CISEC:8192
CVE-2019-10208
Severity:
Low
Description:
A flaw was discovered in postgresql where arbitrary SQL statements can be executed given a suitable SECURITY DEFINER function. An attacker, with EXECUTE permission on the function, can execute arbitrary SQL as the owner of the function.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8193
Title:
oval:org.cisecurity:def:8193: Vulnerability in PostgreSQL 9.3.x before 9.3.22, 9.4.x before 9.4.17, 9.5.x before 9.5.12, 9.6.x before 9.6.8 and 10.x before 10.3
Type:
Software
Bulletins:
CISEC:8193
CVE-2018-1058
Severity:
Medium
Description:
A flaw was found in the way Postgresql allowed a user to modify the behavior of a query for other users. An attacker with a user account could use this flaw to execute code with the permissions of superuser in the database. Versions 9.3 through 10 are affected.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8194
Title:
oval:org.cisecurity:def:8194: Vulnerability in PostgreSQL
Type:
Software
Bulletins:
CISEC:8194
CVE-2010-1447
Severity:
High
Description:
The Safe (aka Safe.pm) module 2.26, and certain earlier versions, for Perl, as used in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2, allows context-dependent attackers to bypass intended (1) Safe::reval and (2) Safe::rdo access restrictions, and inject and execute arbitrary code, via vectors involving subroutine references and delayed execution.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8175
Title:
oval:org.cisecurity:def:8175: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8175
CVE-2020-1566
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8176
Title:
oval:org.cisecurity:def:8176: Multiple stack-based buffer overflows in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5
Type:
Software
Bulletins:
CISEC:8176
CVE-2015-5289
Severity:
Medium
Description:
Multiple stack-based buffer overflows in json parsing in PostgreSQL before 9.3.x before 9.3.10 and 9.4.x before 9.4.5 allow attackers to cause a denial of service (server crash) via unspecified vectors, which are not properly handled in (1) json or (2) jsonb values.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8177
Title:
oval:org.cisecurity:def:8177: Vulnerability in PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9
Type:
Software
Bulletins:
CISEC:8177
CVE-2013-1901
Severity:
Medium
Description:
PostgreSQL 9.2.x before 9.2.4 and 9.1.x before 9.1.9 does not properly check REPLICATION privileges, which allows remote authenticated users to bypass intended backup restrictions by calling the (1) pg_start_backup or (2) pg_stop_backup functions.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8178
Title:
oval:org.cisecurity:def:8178: Memory disclosure vulnerability in PostgreSQL 10.x before 10.2
Type:
Software
Bulletins:
CISEC:8178
CVE-2018-1052
Severity:
Medium
Description:
Memory disclosure vulnerability in table partitioning was found in postgresql 10.x before 10.2, allowing an authenticated attacker to read arbitrary bytes of server memory via purpose-crafted insert to a partitioned table.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8179
Title:
oval:org.cisecurity:def:8179: Vulnerability in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3
Type:
Software
Bulletins:
CISEC:8179
CVE-2014-0060
Severity:
Medium
Description:
PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly enforce the ADMIN OPTION restriction, which allows remote authenticated members of a role to add or remove arbitrary users to that role by calling the SET ROLE command before the associated GRANT command.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8180
Title:
oval:org.cisecurity:def:8180: Vulnerability in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3
Type:
Software
Bulletins:
CISEC:8180
CVE-2014-0066
Severity:
Medium
Description:
The chkpass extension in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 does not properly check the return value of the crypt library function, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via unspecified vectors.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8181
Title:
oval:org.cisecurity:def:8181: Vulnerability in PostgreSQL 10.x before 10.4, 9.6.x before 9.6.9
Type:
Software
Bulletins:
CISEC:8181
CVE-2018-1115
Severity:
Medium
Description:
postgresql before versions 10.4, 9.6.9 is vulnerable in the adminpack extension, the pg_catalog.pg_logfile_rotate() function doesn't follow the same ACLs than pg_rorate_logfile. If the adminpack is added to a database, an attacker able to connect to it could exploit this to force log rotation.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8182
Title:
oval:org.cisecurity:def:8182: Unanticipated errors from the standard library in PostgreSQL
Type:
Software
Bulletins:
CISEC:8182
Severity:
Low
Description:
Unanticipated errors from the standard library in PostgreSQL before 9.4.2, 9.3.7, 9.2.11, 9.1.16, and 9.0.20.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8183
Title:
oval:org.cisecurity:def:8183: Vulnerability in PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4
Type:
Software
Bulletins:
CISEC:8183
CVE-2012-2655
Severity:
Medium
Description:
PostgreSQL 8.3.x before 8.3.19, 8.4.x before 8.4.12, 9.0.x before 9.0.8, and 9.1.x before 9.1.4 allows remote authenticated users to cause a denial of service (server crash) by adding the (1) SECURITY DEFINER or (2) SET attributes to a procedural language's call handler.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8184
Title:
oval:org.cisecurity:def:8184: Vulnerability in PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2
Type:
Software
Bulletins:
CISEC:8184
CVE-2009-4136
Severity:
Medium
Description:
PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly manage session-local state during execution of an index function by a database superuser, which allows remote authenticated users to gain privileges via a table with crafted index functions, as demonstrated by functions that modify (1) search_path or (2) a prepared statement, a related issue to CVE-2007-6600 and CVE-2009-3230.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8185
Title:
oval:org.cisecurity:def:8185: Vulnerability in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5
Type:
Software
Bulletins:
CISEC:8185
CVE-2012-3489
Severity:
Medium
Description:
The xml_parse function in the libxml2 support in the core server component in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 allows remote authenticated users to determine the existence of arbitrary files or URLs, and possibly obtain file or URL content that triggers a parsing error, via an XML value that refers to (1) a DTD or (2) an entity, related to an XML External Entity (aka XXE) issue.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8186
Title:
oval:org.cisecurity:def:8186: Vulnerability in PostgreSQL
Type:
Software
Bulletins:
CISEC:8186
CVE-2010-1170
Severity:
Medium
Description:
The PL/Tcl implementation in PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 loads Tcl code from the pltcl_modules table regardless of the table's ownership and permissions, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Tcl code by creating this table and inserting a crafted Tcl script.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8187
Title:
oval:org.cisecurity:def:8187: Vulnerability in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10
Type:
Software
Bulletins:
CISEC:8187
CVE-2017-15099
Severity:
Medium
Description:
INSERT ... ON CONFLICT DO UPDATE commands in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, and 9.5.x before 9.5.10 disclose table contents that the invoker lacks privilege to read. These exploits affect only tables where the attacker lacks full read access but has both INSERT and UPDATE privileges. Exploits bypass row level security policies and lack of SELECT privilege.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8201
Title:
oval:org.cisecurity:def:8201: pgcrypto has multiple error messages for decryption with an incorrect key in PostgreSQL
Type:
Software
Bulletins:
CISEC:8201
Severity:
Low
Description:
pgcrypto has multiple error messages for decryption with an incorrect key in PostgreSQL before 9.4.2, 9.3.7, 9.2.11, 9.1.16, and 9.0.20.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8202
Title:
oval:org.cisecurity:def:8202: Vulnerability in PostgreSQL before 9.2.22, 9.3.x before 9.3.18, 9.4.x before 9.4.13, 9.5.x before 9.5.8, and 9.6.x before 9.6.4
Type:
Software
Bulletins:
CISEC:8202
CVE-2017-7547
Severity:
Medium
Description:
PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers to retrieve passwords from the user mappings defined by the foreign server owners without actually having the privileges to do so.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8203
Title:
oval:org.cisecurity:def:8203: Vulnerability in PHP through 5.3.13, PostgreSQL 8.4 before 8.4.12, PostgreSQL 9.0 before 9.0.8, PostgreSQL 9.1 before 9.1.4
Type:
Software
Bulletins:
CISEC:8203
CVE-2012-2143
Severity:
Medium
Description:
The crypt_des (aka DES-based crypt) function in FreeBSD before 9.0-RELEASE-p2, as used in PHP, PostgreSQL, and other products, does not process the complete cleartext password if this password contains a 0x80 character, which makes it easier for context-dependent attackers to obtain access via an authentication attempt with an initial substring of the intended password, as demonstrated by a Unicode password.
Applies to:
PHP
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8204
Title:
oval:org.cisecurity:def:8204: Vulnerability in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20
Type:
Software
Bulletins:
CISEC:8204
CVE-2017-15098
Severity:
Medium
Description:
Invalid json_populate_recordset or jsonb_populate_recordset function calls in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, and 9.3.x before 9.3.20 can crash the server or disclose a few bytes of server memory.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8205
Title:
oval:org.cisecurity:def:8205: Vulnerability in PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3
Type:
Software
Bulletins:
CISEC:8205
CVE-2012-0867
Severity:
Medium
Description:
PostgreSQL 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 truncates the common name to only 32 characters when verifying SSL certificates, which allows remote attackers to spoof connections when the host name is exactly 32 characters.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8206
Title:
oval:org.cisecurity:def:8206: Vulnerability PostgreSQL before 12.2, before 11.7, before 10.12 and before 9.6.17.
Type:
Software
Bulletins:
CISEC:8206
CVE-2020-1720
Severity:
Low
Description:
A flaw was found in PostgreSQL's "ALTER ... DEPENDS ON EXTENSION", where sub-commands did not perform authorization checks. An authenticated attacker could use this flaw in certain configurations to perform drop objects such as function, triggers, et al., leading to database corruption. This issue affects PostgreSQL versions before 12.2, before 11.7, before 10.12 and before 9.6.17.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8207
Title:
oval:org.cisecurity:def:8207: Vulnerability in PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4
Type:
Software
Bulletins:
CISEC:8207
CVE-2016-5424
Severity:
Medium
Description:
PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 might allow remote authenticated users with the CREATEDB or CREATEROLE role to gain superuser privileges via a (1) " (double quote), (2) \ (backslash), (3) carriage return, or (4) newline character in a (a) database or (b) role name that is mishandled during an administrative operation.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8208
Title:
oval:org.cisecurity:def:8208: Vulnerability in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5
Type:
Software
Bulletins:
CISEC:8208
CVE-2015-5288
Severity:
Medium
Description:
The crypt function in contrib/pgcrypto in PostgreSQL before 9.0.23, 9.1.x before 9.1.19, 9.2.x before 9.2.14, 9.3.x before 9.3.10, and 9.4.x before 9.4.5 allows attackers to cause a denial of service (server crash) or read arbitrary server memory via a "too-short" salt.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8209
Title:
oval:org.cisecurity:def:8209: Buffer overruns in PostgreSQL
Type:
Software
Bulletins:
CISEC:8209
Severity:
Low
Description:
Buffer overruns in "to_char" functions in PostgreSQL before 9.4.1, 9.3.6, 9.2.10, 9.1.15 and 9.0.19.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8210
Title:
oval:org.cisecurity:def:8210: Vulnerability in PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1
Type:
Software
Bulletins:
CISEC:8210
CVE-2016-0773
Severity:
Medium
Description:
PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 allows remote attackers to cause a denial of service (infinite loop or buffer overflow and crash) via a large Unicode character range in a regular expression.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8211
Title:
oval:org.cisecurity:def:8211: Vulnerability in PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24
Type:
Software
Bulletins:
CISEC:8211
Severity:
Low
Description:
It was discovered that PostgreSQL versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 failed to properly check authorization on certain statements involved with "INSERT ... ON CONFLICT DO UPDATE". An attacker with "CREATE TABLE" privileges could exploit this to read arbitrary bytes server memory. If the attacker also had certain "INSERT" and limited "UPDATE" privileges to a particular table, they could exploit this to update other columns in the same table.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8212
Title:
oval:org.cisecurity:def:8212: Vulnerability in PostgreSQL 11.x before 11.5
Type:
Software
Bulletins:
CISEC:8212
CVE-2019-10209
Severity:
Low
Description:
Postgresql, versions 11.x before 11.5, is vulnerable to a memory disclosure in cross-type comparison for hashed subplan.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8213
Title:
oval:org.cisecurity:def:8213: Vulnerability in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5
Type:
Software
Bulletins:
CISEC:8213
CVE-2012-3488
Severity:
Medium
Description:
The libxslt support in contrib/xml2 in PostgreSQL 8.3 before 8.3.20, 8.4 before 8.4.13, 9.0 before 9.0.9, and 9.1 before 9.1.5 does not properly restrict access to files and URLs, which allows remote authenticated users to modify data, obtain sensitive information, or trigger outbound traffic to arbitrary external hosts by leveraging (1) stylesheet commands that are permitted by the libxslt security options or (2) an xslt_process feature, related to an XML External Entity (aka XXE) issue.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8214
Title:
oval:org.cisecurity:def:8214: Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13
Type:
Software
Bulletins:
CISEC:8214
CVE-2013-1899
Severity:
Medium
Description:
Argument injection vulnerability in PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, and 9.0.x before 9.0.13 allows remote attackers to cause a denial of service (file corruption), and allows remote authenticated users to modify configuration settings and execute arbitrary code, via a connection request using a database name that begins with a "-" (hyphen).
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8215
Title:
oval:org.cisecurity:def:8215: Integer overflow in PostgreSQL 8.4.1 and earlier, and 8.5 through 8.5alpha2
Type:
Software
Bulletins:
CISEC:8215
CVE-2010-0733
Severity:
Low
Description:
Integer overflow in src/backend/executor/nodeHash.c in PostgreSQL 8.4.1 and earlier, and 8.5 through 8.5alpha2, allows remote authenticated users to cause a denial of service (daemon crash) via a SELECT statement with many LEFT JOIN clauses, related to certain hashtable size calculations.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8216
Title:
oval:org.cisecurity:def:8216: Vulnerability insufficiently random numbers
Type:
Software
Bulletins:
CISEC:8216
CVE-2013-1900
Severity:
High
Description:
PostgreSQL 9.2.x before 9.2.4, 9.1.x before 9.1.9, 9.0.x before 9.0.13, and 8.4.x before 8.4.17, when using OpenSSL, generates insufficiently random numbers, which might allow remote authenticated users to have an unspecified impact via vectors related to the "contrib/pgcrypto functions."
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8217
Title:
oval:org.cisecurity:def:8217: CRLF injection vulnerability in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3
Type:
Software
Bulletins:
CISEC:8217
CVE-2012-0868
Severity:
Medium
Description:
CRLF injection vulnerability in pg_dump in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 allows user-assisted remote attackers to execute arbitrary SQL commands via a crafted file containing object names with newlines, which are inserted into an SQL script that is used when the database is restored.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8218
Title:
oval:org.cisecurity:def:8218: Vulnerability in PostgreSQL before 9.5.x before 9.5.2
Type:
Software
Bulletins:
CISEC:8218
CVE-2016-3065
Severity:
High
Description:
The (1) brin_page_type and (2) brin_metapage_info functions in the pageinspect extension in PostgreSQL before 9.5.x before 9.5.2 allows attackers to bypass intended access restrictions and consequently obtain sensitive server memory information or cause a denial of service (server crash) via a crafted bytea value in a BRIN index page.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8219
Title:
oval:org.cisecurity:def:8219: Vulnerability in PostgreSQL before 9.2.22, 9.3.x before 9.3.18, 9.4.x before 9.4.13, 9.5.x before 9.5.8, and 9.6.x before 9.6.4
Type:
Software
Bulletins:
CISEC:8219
CVE-2017-7546
Severity:
High
Description:
PostgreSQL versions before 9.2.22, 9.3.18, 9.4.13, 9.5.8 and 9.6.4 are vulnerable to incorrect authentication flaw allowing remote attackers to gain access to database accounts with an empty password.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8220
Title:
oval:org.cisecurity:def:8220: Vulnerability in PostgreSQL 11.x prior to 11.3
Type:
Software
Bulletins:
CISEC:8220
CVE-2019-10129
Severity:
Medium
Description:
A vulnerability was found in postgresql versions 11.x prior to 11.3. Using a purpose-crafted insert to a partitioned table, an attacker can read arbitrary bytes of server memory. In the default configuration, any user can create a partitioned table suitable for this attack. (Exploit prerequisites are the same as for CVE-2018-1052).
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8221
Title:
oval:org.cisecurity:def:8221: Vulnerability in PostgreSQL
Type:
Software
Bulletins:
CISEC:8221
CVE-2010-1169
Severity:
High
Description:
PostgreSQL 7.4 before 7.4.29, 8.0 before 8.0.25, 8.1 before 8.1.21, 8.2 before 8.2.17, 8.3 before 8.3.11, 8.4 before 8.4.4, and 9.0 Beta before 9.0 Beta 2 does not properly restrict PL/perl procedures, which allows remote authenticated users, with database-creation privileges, to execute arbitrary Perl code via a crafted script, related to the Safe module (aka Safe.pm) for Perl. NOTE: some sources report that this issue is the same as CVE-2010-1447.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8222
Title:
oval:org.cisecurity:def:8222: Vulnerability in PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4
Type:
Software
Bulletins:
CISEC:8222
CVE-2016-5423
Severity:
Medium
Description:
PostgreSQL before 9.1.23, 9.2.x before 9.2.18, 9.3.x before 9.3.14, 9.4.x before 9.4.9, and 9.5.x before 9.5.4 allow remote authenticated users to cause a denial of service (NULL pointer dereference and server crash), obtain sensitive memory information, or possibly execute arbitrary code via (1) a CASE expression within the test value subexpression of another CASE or (2) inlining of an SQL function that implements the equality operator used for a CASE expression involving values of different types.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8223
Title:
oval:org.cisecurity:def:8223: Vulnerability in PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24
Type:
Software
Bulletins:
CISEC:8223
CVE-2017-12172
Severity:
High
Description:
PostgreSQL 10.x before 10.1, 9.6.x before 9.6.6, 9.5.x before 9.5.10, 9.4.x before 9.4.15, 9.3.x before 9.3.20, and 9.2.x before 9.2.24 runs under a non-root operating system account, and database superusers have effective ability to run arbitrary code under that system account. PostgreSQL provides a script for starting the database server during system boot. Packages of PostgreSQL for many operating systems provide their own, packager-authored startup implementations. Several implementations use a log file name that the database superuser can replace with a symbolic link. As root, they open(), chmod() and/or chown() this log file name. This often suffices for the database superuser to escalate to root privileges when root starts the server.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8224
Title:
oval:org.cisecurity:def:8224: Vulnerability in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3
Type:
Software
Bulletins:
CISEC:8224
CVE-2017-7486
Severity:
Medium
Description:
PostgreSQL versions 8.4 - 9.6 are vulnerable to information leak in pg_user_mappings view which discloses foreign server passwords to any user having USAGE privilege on the associated foreign server.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8225
Title:
oval:org.cisecurity:def:8225: Vulnerability in PostgreSQL before 9.2.22, 9.3.x before 9.3.18, 9.4.x before 9.4.13, 9.5.x before 9.5.8, and 9.6.x before 9.6.4
Type:
Software
Bulletins:
CISEC:8225
CVE-2017-7548
Severity:
Medium
Description:
PostgreSQL versions before 9.4.13, 9.5.8 and 9.6.4 are vulnerable to authorization flaw allowing remote authenticated attackers with no privileges on a large object to overwrite the entire contents of the object, resulting in a denial of service.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8226
Title:
oval:org.cisecurity:def:8226: Race condition INDEX and
Type:
Software
Bulletins:
CISEC:8226
CVE-2014-0062
Severity:
Medium
Description:
Race condition in the (1) CREATE INDEX and (2) unspecified ALTER TABLE commands in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allows remote authenticated users to create an unauthorized index or read portions of unauthorized tables by creating or deleting a table with the same name during the timing window.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8227
Title:
oval:org.cisecurity:def:8227: Vulnerability in Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24
Type:
Software
Bulletins:
CISEC:8227
Severity:
Low
Description:
A vulnerability was found in libpq, the default PostgreSQL client library where libpq failed to properly reset its internal state between connections. If an affected version of libpq was used with "host" or "hostaddr" connection parameters from untrusted input, attackers could bypass client-side connection security features, obtain access to higher privileged connections or potentially cause other impact through SQL injection, by causing the PQescape() functions to malfunction. Postgresql versions before 10.5, 9.6.10, 9.5.14, 9.4.19, and 9.3.24 are affected.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8228
Title:
oval:org.cisecurity:def:8228: CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3
Type:
Software
Bulletins:
CISEC:8228
CVE-2012-0866
Severity:
Medium
Description:
CREATE TRIGGER in PostgreSQL 8.3.x before 8.3.18, 8.4.x before 8.4.11, 9.0.x before 9.0.7, and 9.1.x before 9.1.3 does not properly check the execute permission for trigger functions marked SECURITY DEFINER, which allows remote authenticated users to execute otherwise restricted triggers on arbitrary data by installing the trigger on an attacker-owned table.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8229
Title:
oval:org.cisecurity:def:8229: Vulnerability in PostgreSQL
Type:
Software
Bulletins:
CISEC:8229
CVE-2014-0061
Severity:
Medium
Description:
The validator functions for the procedural languages (PLs) in PostgreSQL before 8.4.20, 9.0.x before 9.0.16, 9.1.x before 9.1.12, 9.2.x before 9.2.7, and 9.3.x before 9.3.3 allow remote authenticated users to gain privileges via a function that is (1) defined in another language or (2) not allowed to be directly called by the user due to permissions.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8230
Title:
oval:org.cisecurity:def:8230: Buffer overflow intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20
Type:
Software
Bulletins:
CISEC:8230
CVE-2010-4015
Severity:
Medium
Description:
Buffer overflow in the gettoken function in contrib/intarray/_int_bool.c in the intarray array module in PostgreSQL 9.0.x before 9.0.3, 8.4.x before 8.4.7, 8.3.x before 8.3.14, and 8.2.x before 8.2.20 allows remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via integers with a large number of digits to unspecified functions.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8231
Title:
oval:org.cisecurity:def:8231: Arbitrary code execution vulnerability in PostgreSQL 9.3 through 11.2
Type:
Software
Bulletins:
CISEC:8231
CVE-2019-9193
Severity:
High
Description:
In PostgreSQL 9.3 through 11.2, the "COPY TO/FROM PROGRAM" function allows superusers and users in the 'pg_read_server_files' group to execute arbitrary code in the context of the database's operating system user. This functionality is enabled by default and can be abused to run arbitrary operating system commands on Windows, Linux, and macOS.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8232
Title:
oval:org.cisecurity:def:8232: Vulnerability in PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2
Type:
Software
Bulletins:
CISEC:8232
CVE-2009-4034
Severity:
Medium
Description:
PostgreSQL 7.4.x before 7.4.27, 8.0.x before 8.0.23, 8.1.x before 8.1.19, 8.2.x before 8.2.15, 8.3.x before 8.3.9, and 8.4.x before 8.4.2 does not properly handle a '\0' character in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based PostgreSQL servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended client-hostname restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8233
Title:
oval:org.cisecurity:def:8233: An error in PostgreSQL
Type:
Software
Bulletins:
CISEC:8233
Severity:
Low
Description:
An error in extended protocol message reading in PostgreSQL before 9.4.1, 9.3.6, 9.2.10, 9.1.15 and 9.0.19.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8234
Title:
oval:org.cisecurity:def:8234: Vulnerability in PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1
Type:
Software
Bulletins:
CISEC:8234
CVE-2016-0766
Severity:
High
Description:
PostgreSQL before 9.1.20, 9.2.x before 9.2.15, 9.3.x before 9.3.11, 9.4.x before 9.4.6, and 9.5.x before 9.5.1 does not properly restrict access to unspecified custom configuration settings (GUCS) for PL/Java, which allows attackers to gain privileges via unspecified vectors.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8235
Title:
oval:org.cisecurity:def:8235: Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2
Type:
Software
Bulletins:
CISEC:8235
CVE-2015-3165
Severity:
Medium
Description:
Double free vulnerability in PostgreSQL before 9.0.20, 9.1.x before 9.1.16, 9.2.x before 9.2.11, 9.3.x before 9.3.7, and 9.4.x before 9.4.2 allows remote attackers to cause a denial of service (crash) by closing an SSL session at a time when the authentication timeout will expire during the session shutdown sequence.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8236
Title:
oval:org.cisecurity:def:8236: Vulnerability in PostgreSQL before 9.2.21, 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3
Type:
Software
Bulletins:
CISEC:8236
CVE-2017-7485
Severity:
Medium
Description:
In PostgreSQL 9.3.x before 9.3.17, 9.4.x before 9.4.12, 9.5.x before 9.5.7, and 9.6.x before 9.6.3, it was found that the PGREQUIRESSL environment variable was no longer enforcing a SSL/TLS connection to a PostgreSQL server. An active Man-in-the-Middle attacker could use this flaw to strip the SSL/TLS protection from a connection between a client and a server.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8237
Title:
oval:org.cisecurity:def:8237: Vulnerability in PostgreSQL before 11.1, 10.6
Type:
Software
Bulletins:
CISEC:8237
Severity:
Low
Description:
PostgreSQL before versions 11.1, 10.6 is vulnerable to a to SQL injection in pg_upgrade and pg_dump via CREATE TRIGGER ... REFERENCING. Using a purpose-crafted trigger definition, an attacker can cause arbitrary SQL statements to run, with superuser privileges.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8238
Title:
oval:org.cisecurity:def:8238: Constraint violation errors in PostgreSQL
Type:
Software
Bulletins:
CISEC:8238
Severity:
Low
Description:
Constraint violation errors can cause display of values in columns which the user would not normally have rights to see in PostgreSQL before 9.4.1, 9.3.6, 9.2.10, 9.1.15 and 9.0.19.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8239
Title:
oval:org.cisecurity:def:8239: Buffer overrun in PostgreSQL
Type:
Software
Bulletins:
CISEC:8239
Severity:
Low
Description:
Buffer overrun in replacement printf family of functions in PostgreSQL before 9.4.1, 9.3.6, 9.2.10, 9.1.15 and 9.0.19.
Applies to:
PostgreSQL
Created:
2020-09-11
Updated:
2020-09-11

ID:
CISEC:8350
Title:
oval:org.cisecurity:def:8350: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8350
CVE-2020-1169
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8351
Title:
oval:org.cisecurity:def:8351: Connected User Experiences and Telemetry Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8351
CVE-2020-1590
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service handles file operations.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8352
Title:
oval:org.cisecurity:def:8352: Windows Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8352
CVE-2020-1097
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage. The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8353
Title:
oval:org.cisecurity:def:8353: Windows Text Service Module Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8353
CVE-2020-0908
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Text Service Module improperly handles memory. An attacker who successfully exploited the vulnerability could gain execution on a victim system. An attacker could host a specially crafted website that is designed to exploit the vulnerability through Microsoft Edge (Chromium-based), and then convince a user to view the website. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements by adding specially crafted content that could exploit the vulnerability. In all cases, however, an attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by way of enticement in an email or Instant Messenger message, or by getting them to open an attachment sent through email. The security update addresses the vulnerability by correcting how the Windows Text Service Module handles memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8354
Title:
oval:org.cisecurity:def:8354: Windows Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8354
CVE-2020-1091
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise a user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document or by convincing a user to visit an untrusted webpage. The update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8355
Title:
oval:org.cisecurity:def:8355: GDI+ Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8355
CVE-2020-1285
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message. In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file. The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8356
Title:
oval:org.cisecurity:def:8356: Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8356
CVE-2020-1129
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. Exploitation of the vulnerability requires that a program process a specially crafted image file. The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8357
Title:
oval:org.cisecurity:def:8357: Windows CloudExperienceHost Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8357
CVE-2020-1471
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft Windows CloudExperienceHost fails to check COM objects. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The security update addresses the vulnerability by checking COM objects.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8358
Title:
oval:org.cisecurity:def:8358: Microsoft Store Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8358
CVE-2020-0766
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Microsoft Store Runtime handles memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8359
Title:
oval:org.cisecurity:def:8359: Windows DNS Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:8359
CVE-2020-0836
Severity:
Low
Description:
A denial of service vulnerability exists in Windows DNS when it fails to properly handle queries. An attacker who successfully exploited this vulnerability could cause the DNS service to become nonresponsive. To exploit the vulnerability, an authenticated attacker could send malicious DNS queries to a target, resulting in a denial of service. The update addresses the vulnerability by correcting how Windows DNS processes queries.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8335
Title:
oval:org.cisecurity:def:8335: Windows Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8335
CVE-2020-1119
Severity:
Low
Description:
An information disclosure vulnerability exists when StartTileData.dll improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The update addresses the vulnerability by correcting the way in which StartTileData.dll handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8336
Title:
oval:org.cisecurity:def:8336: Windows Camera Codec Pack Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8336
CVE-2020-0997
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Camera Codec Pack improperly handles objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of the Windows Camera Codec Pack. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how the Windows Camera Codec Pack handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8337
Title:
oval:org.cisecurity:def:8337: Active Directory Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8337
CVE-2020-0761
Severity:
Low
Description:
A remote code execution vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account To exploit the vulnerability, an authenticated attacker could send malicious requests to an Active Directory integrated DNS (ADIDNS) server. The update addresses the vulnerability by correcting how Active Directory integrated DNS (ADIDNS) handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8338
Title:
oval:org.cisecurity:def:8338: Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8338
CVE-2020-1083
Severity:
Low
Description:
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8339
Title:
oval:org.cisecurity:def:8339: Microsoft splwow64 Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8339
CVE-2020-0790
Severity:
Low
Description:
A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity. This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted. The security update addresses the vulnerability by ensuring splwow64.exe properly handles these calls..
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8340
Title:
oval:org.cisecurity:def:8340: Windows Routing Utilities Denial of Service
Type:
Software
Bulletins:
CISEC:8340
CVE-2020-1038
Severity:
Low
Description:
A denial of service vulnerability exists when Windows Routing Utilities improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8341
Title:
oval:org.cisecurity:def:8341: Windows Storage Services Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8341
CVE-2020-0886
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Storage Services properly handle file operations.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8342
Title:
oval:org.cisecurity:def:8342: Windows DNS Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:8342
CVE-2020-1228
Severity:
Low
Description:
A denial of service vulnerability exists in Windows DNS when it fails to properly handle queries. An attacker who successfully exploited this vulnerability could cause the DNS service to become nonresponsive. To exploit the vulnerability, an authenticated attacker could send malicious DNS queries to a target, resulting in a denial of service. The update addresses the vulnerability by correcting how Windows DNS processes queries.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8343
Title:
oval:org.cisecurity:def:8343: DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8343
CVE-2020-1308
Severity:
Low
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8344
Title:
oval:org.cisecurity:def:8344: Windows UPnP Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8344
CVE-2020-1598
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows UPnP service handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8286
Title:
oval:org.cisecurity:def:8286: Active Directory Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8286
CVE-2020-0664
Severity:
Low
Description:
An information disclosure vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system. To exploit this condition, an authenticated attacker would need to send a specially crafted request to the AD|DNS service. Note that the information disclosure vulnerability by itself would not be sufficient for an attacker to compromise a system. However, an attacker could combine this vulnerability with additional vulnerabilities to further exploit the system. The update addresses the vulnerability by correcting how Active Directory integrated DNS (ADIDNS) handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8287
Title:
oval:org.cisecurity:def:8287: Active Directory Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8287
CVE-2020-0856
Severity:
Low
Description:
An information disclosure vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited this vulnerability would be able to read sensitive information about the target system. To exploit this condition, an authenticated attacker would need to send a specially crafted request to the AD|DNS service. Note that the information disclosure vulnerability by itself would not be sufficient for an attacker to compromise a system. However, an attacker could combine this vulnerability with additional vulnerabilities to further exploit the system. The update addresses the vulnerability by correcting how Active Directory integrated DNS (ADIDNS) handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8288
Title:
oval:org.cisecurity:def:8288: Windows RSoP Service Application Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8288
CVE-2020-0648
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows RSoP Service Application improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows RSoP Service Application handles memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8289
Title:
oval:org.cisecurity:def:8289: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8289
CVE-2020-1074
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8290
Title:
oval:org.cisecurity:def:8290: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8290
CVE-2020-1592
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly initializes objects in memory. To exploit this vulnerability, an authenticated attacker could run a specially crafted application. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The update addresses the vulnerability by correcting how the Windows kernel initializes objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8291
Title:
oval:org.cisecurity:def:8291: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8291
CVE-2020-1245
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how Win32k handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8292
Title:
oval:org.cisecurity:def:8292: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8292
CVE-2020-1303
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8293
Title:
oval:org.cisecurity:def:8293: Windows Language Pack Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8293
CVE-2020-1122
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Language Pack Installer improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Language Pack Installer handles file operations.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8294
Title:
oval:org.cisecurity:def:8294: Microsoft COM for Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8294
CVE-2020-1507
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8295
Title:
oval:org.cisecurity:def:8295: Windows Function Discovery Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8295
CVE-2020-1491
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Function Discovery Service properly handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8296
Title:
oval:org.cisecurity:def:8296: Windows Common Log File System Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8296
CVE-2020-1115
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8297
Title:
oval:org.cisecurity:def:8297: Microsoft Store Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8297
CVE-2020-1146
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Microsoft Store Runtime handles memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8298
Title:
oval:org.cisecurity:def:8298: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8298
CVE-2020-1034
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8299
Title:
oval:org.cisecurity:def:8299: Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8299
CVE-2020-0941
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an attacker would have to either log on locally to an affected system, or convince a locally authenticated user to execute a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8300
Title:
oval:org.cisecurity:def:8300: NTFS Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8300
CVE-2020-0838
Severity:
Low
Description:
An elevation of privilege vulnerability exists when NTFS improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how NTFS checks access.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8301
Title:
oval:org.cisecurity:def:8301: Windows InstallService Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8301
CVE-2020-1532
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows InstallService improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows InstallService handles memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8302
Title:
oval:org.cisecurity:def:8302: Windows dnsrslvr.dll Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8302
CVE-2020-0839
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the dnsrslvr.dll properly handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8303
Title:
oval:org.cisecurity:def:8303: Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8303
CVE-2020-0998
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8304
Title:
oval:org.cisecurity:def:8304: Windows Mobile Device Management Diagnostics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8304
CVE-2020-0989
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions. An attacker who successfully exploited this vulnerability could bypass access restrictions to read files. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and access files. The security update addresses the vulnerability by correcting the how Windows MDM Diagnostics handles files.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8305
Title:
oval:org.cisecurity:def:8305: Microsoft COM for Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8305
CVE-2020-0922
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file or lure the target to a website hosting malicious JavaScript. The security update addresses the vulnerability by correcting how Microsoft COM for Windows handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8306
Title:
oval:org.cisecurity:def:8306: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8306
CVE-2020-1039
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8307
Title:
oval:org.cisecurity:def:8307: Windows Cryptographic Catalog Services Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8307
CVE-2020-0782
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Cryptographic Catalog Services improperly handle objects in memory. An attacker who successfully exploited this vulnerability could modify the cryptographic catalog. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by addressing how the Windows Cryptographic Catalog Services handle objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8308
Title:
oval:org.cisecurity:def:8308: Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:8308
CVE-2020-0904
Severity:
Low
Description:
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8309
Title:
oval:org.cisecurity:def:8309: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8309
CVE-2020-0928
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8310
Title:
oval:org.cisecurity:def:8310: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8310
CVE-2020-1033
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8311
Title:
oval:org.cisecurity:def:8311: Projected Filesystem Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8311
CVE-2020-16879
Severity:
Low
Description:
An information disclosure vulnerability exists when a Windows Projected Filesystem improperly handles file redirections. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability. The security update addresses the vulnerability by correcting how Windows Projected Filesystem handle file redirections.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8312
Title:
oval:org.cisecurity:def:8312: Windows Defender Application Control Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:8312
CVE-2020-0951
Severity:
Low
Description:
A security feature bypass vulnerability exists in Windows Defender Application Control (WDAC) which could allow an attacker to bypass WDAC enforcement. An attacker who successfully exploited this vulnerability could execute PowerShell commands that would be blocked by WDAC. To exploit the vulnerability, an attacker need administrator access on a local machine where PowerShell is running. The attacker could then connect to a PowerShell session and send commands to execute arbitrary code. The update addresses the vulnerability by correcting how PowerShell commands are validated when WDAC protection is enabled.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8313
Title:
oval:org.cisecurity:def:8313: Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8313
CVE-2020-0921
Severity:
Low
Description:
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8314
Title:
oval:org.cisecurity:def:8314: Windows Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8314
CVE-2020-1152
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Win32k.sys. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how Windows handles calls to Win32k.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8315
Title:
oval:org.cisecurity:def:8315: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8315
CVE-2020-1256
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8316
Title:
oval:org.cisecurity:def:8316: Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8316
CVE-2020-1250
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8317
Title:
oval:org.cisecurity:def:8317: Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8317
CVE-2020-1252
Severity:
Low
Description:
A remote code execution vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited this vulnerability could take control of an affected system. To exploit the vulnerability, an attacker would first have to log on to the target system and then run a specially crafted application. The updates address the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8318
Title:
oval:org.cisecurity:def:8318: Windows Print Spooler Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8318
CVE-2020-1030
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8319
Title:
oval:org.cisecurity:def:8319: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8319
CVE-2020-16854
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8320
Title:
oval:org.cisecurity:def:8320: Windows Modules Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8320
CVE-2020-0911
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Modules Installer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Modules Installer handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8321
Title:
oval:org.cisecurity:def:8321: Active Directory Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8321
CVE-2020-0718
Severity:
Low
Description:
A remote code execution vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account To exploit the vulnerability, an authenticated attacker could send malicious requests to an Active Directory integrated DNS (ADIDNS) server. The update addresses the vulnerability by correcting how Active Directory integrated DNS (ADIDNS) handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8322
Title:
oval:org.cisecurity:def:8322: Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:8322
CVE-2020-0890
Severity:
Low
Description:
A denial of service vulnerability exists when Microsoft Hyper-V on a host server fails to properly validate specific malicious data from a user on a guest operating system. To exploit the vulnerability, an attacker who already has a privileged account on a guest operating system, running as a virtual machine, could run a specially crafted application. The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to handle these requests.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8323
Title:
oval:org.cisecurity:def:8323: Shell infrastructure component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8323
CVE-2020-0870
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Shell infrastructure component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting the way in which the Shell infrastructure component handles objects in memory and preventing unintended elevation from lower integrity application.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8324
Title:
oval:org.cisecurity:def:8324: Microsoft splwow64 Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8324
CVE-2020-0875
Severity:
Low
Description:
An information disclosure vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system (low-integrity to medium-integrity). This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted. The security update addresses the vulnerability by ensuring splwow64.exe properly handles these calls.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8325
Title:
oval:org.cisecurity:def:8325: Windows Media Audio Decoder Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8325
CVE-2020-1593
Severity:
Low
Description:
A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Audio Decoder handles objects.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8326
Title:
oval:org.cisecurity:def:8326: Windows State Repository Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8326
CVE-2020-0914
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8327
Title:
oval:org.cisecurity:def:8327: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8327
CVE-2020-1159
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the StartTileData.dll handles file creation in protected locations. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the StartTileData.dll properly handles this type of function.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8328
Title:
oval:org.cisecurity:def:8328: Windows DHCP Server Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8328
CVE-2020-1031
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the Windows Server DHCP service improperly discloses the contents of its memory. To exploit the vulnerability, an unauthenticated attacker could send a specially crafted packet to an affected DHCP server. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. The security update addresses the vulnerability by correcting how DHCP servers initializes memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8329
Title:
oval:org.cisecurity:def:8329: Windows Storage Services Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8329
CVE-2020-1559
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Storage Services properly handle file operations.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8330
Title:
oval:org.cisecurity:def:8330: Group Policy Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8330
CVE-2020-1013
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Microsoft Windows processes group policy updates. An attacker who successfully exploited this vulnerability could potentially escalate permissions or perform additional privileged actions on the target machine. To exploit this vulnerability, an attacker would need to launch a man-in-the-middle (MiTM) attack against the traffic passing between a domain controller and the target machine. An attacker could then create a group policy to grant administrator rights to a standard user. The security update addresses the vulnerability by enforcing Kerberos authentication for certain calls over LDAP.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8331
Title:
oval:org.cisecurity:def:8331: ADFS Spoofing Vulnerability
Type:
Software
Bulletins:
CISEC:8331
CVE-2020-0837
Severity:
Low
Description:
A spoofing vulnerability exists when Active Directory Federation Services (ADFS) improperly handles multi-factor authentication requests. To exploit this vulnerability, an attacker could send a specially crafted authentication request. An attacker who successfully exploited this vulnerability could bypass some, but not all, of the authentication factors. This security update corrects how ADFS handles multi-factor authentication requests.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8332
Title:
oval:org.cisecurity:def:8332: Windows Function Discovery SSDP Provider Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8332
CVE-2020-0912
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Function Discovery SSDP Provider handles memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8333
Title:
oval:org.cisecurity:def:8333: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8333
CVE-2020-1376
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that fdSSDP.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the ssdpsrv.dll properly handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8334
Title:
oval:org.cisecurity:def:8334: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8334
CVE-2020-1052
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the ssdpsrv.dll properly handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8345
Title:
oval:org.cisecurity:def:8345: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8345
CVE-2020-1589
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8346
Title:
oval:org.cisecurity:def:8346: Microsoft Windows Codecs Library Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8346
CVE-2020-1319
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of the vulnerability requires that a program process a specially crafted image file. The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8347
Title:
oval:org.cisecurity:def:8347: DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8347
CVE-2020-1053
Severity:
Low
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8348
Title:
oval:org.cisecurity:def:8348: TLS Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8348
CVE-2020-1596
Severity:
Low
Description:
A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel. To exploit the vulnerability, an attacker would have to conduct a man-in-the-middle attack. The update addresses the vulnerability by correcting how TLS components use hash algorithms.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8349
Title:
oval:org.cisecurity:def:8349: Windows Media Audio Decoder Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8349
CVE-2020-1508
Severity:
Low
Description:
A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Audio Decoder handles objects.
Applies to:
Created:
2020-09-08
Updated:
2020-09-11

ID:
CISEC:8045
Title:
oval:org.cisecurity:def:8045: Vulnerability in Bitdefender Antivirus Free prior to 1.0.17
Type:
Software
Bulletins:
CISEC:8045
CVE-2020-8099
Severity:
Low
Description:
A vulnerability in the improper handling of junctions in Bitdefender Antivirus Free can allow an unprivileged user to substitute a quarantined file, and restore it to a privileged location. This issue affects: Bitdefender Antivirus Free versions prior to 1.0.17.
Applies to:
Bitdefender Antivirus Free
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8047
Title:
oval:org.cisecurity:def:8047: Code injection vulnerability in Bitdefender
Type:
Software
Bulletins:
CISEC:8047
CVE-2017-6186
Severity:
High
Description:
Code injection vulnerability in Bitdefender Total Security 12.0 (and earlier), Internet Security 12.0 (and earlier), and Antivirus Plus 12.0 (and earlier) allows a local attacker to bypass a self-protection mechanism, inject arbitrary code, and take full control of any Bitdefender process via a "DoubleAgent" attack. One perspective on this issue is that (1) these products do not use the Protected Processes feature, and therefore an attacker can enter an arbitrary Application Verifier Provider DLL under Image File Execution Options in the registry; (2) the self-protection mechanism is intended to block all local processes (regardless of privileges) from modifying Image File Execution Options for these products; and (3) this mechanism can be bypassed by an attacker who temporarily renames Image File Execution Options during the attack.
Applies to:
Bitdefender Antivirus Plus
Bitdefender Internet Security
Bitdefender Total Security
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8048
Title:
oval:org.cisecurity:def:8048: Vulnerability in Bitdefender Total Security 2020 prior to 24.0.20.116
Type:
Software
Bulletins:
CISEC:8048
CVE-2020-8102
Severity:
Low
Description:
Improper Input Validation vulnerability in the Safepay browser component of Bitdefender Total Security 2020 allows an external, specially crafted web page to run remote commands inside the Safepay Utility process. This issue affects Bitdefender Total Security 2020 versions prior to 24.0.20.116.
Applies to:
Bitdefender Total Security
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8050
Title:
oval:org.cisecurity:def:8050: Vulnerability in Bitdefender Safepay before 23.0.10.34
Type:
Software
Bulletins:
CISEC:8050
CVE-2019-6737
Severity:
Medium
Description:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of TIScript. The issue lies in the handling of the openFile method, which allows for an arbitrary file write with attacker controlled data. An attacker can leverage this vulnerability execute code in the context of the current process. Was ZDI-CAN-7247.
Applies to:
Bitdefender Safepay
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8051
Title:
oval:org.cisecurity:def:8051: Vulnerability in Bitdefender Antivirus Free prior to 1.0.17.178
Type:
Software
Bulletins:
CISEC:8051
CVE-2020-8103
Severity:
Low
Description:
A vulnerability in the improper handling of symbolic links in Bitdefender Antivirus Free can allow an unprivileged user to substitute a quarantined file, and restore it to a privileged location. This issue affects Bitdefender Antivirus Free versions prior to 1.0.17.178.
Applies to:
Bitdefender Antivirus Free
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8052
Title:
oval:org.cisecurity:def:8052: Vulnerability in Bitdefender Total Security 2020 prior to 24.0.12.69
Type:
Software
Bulletins:
CISEC:8052
CVE-2019-17100
Severity:
Low
Description:
An Untrusted Search Path vulnerability in bdserviceshost.exe as used in Bitdefender Total Security 2020 prior to 24.0.12.69 allows an attacker to execute arbitrary code.
Applies to:
Bitdefender Total Security
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8053
Title:
oval:org.cisecurity:def:8053: Vulnerability in Bitdefender products
Type:
Software
Bulletins:
CISEC:8053
CVE-2019-14242
Severity:
High
Description:
An issue was discovered in Bitdefender products for Windows (Bitdefender Endpoint Security Tool versions prior to 6.6.8.115; and Bitdefender Antivirus Plus, Bitdefender Internet Security, and Bitdefender Total Security versions prior to 23.0.24.120) that can lead to local code injection. A local attacker with administrator privileges can create a malicious DLL file in %SystemRoot%\System32\ that will be executed with local user privileges.
Applies to:
Bitdefender Antivirus Plus
Bitdefender Internet Security
Bitdefender Total Security
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8054
Title:
oval:org.cisecurity:def:8054: Vulnerability in Bitdefender Antivirus Free prior to 1.0.15.138
Type:
Software
Bulletins:
CISEC:8054
Severity:
Low
Description:
An Untrusted Search Path vulnerability in the ServiceInstance.dll library versions 1.0.15.119 and lower, as used in Bitdefender Antivirus Free 2020 versions prior to 1.0.15.138, allows an attacker to load an arbitrary DLL file from the search path.
Applies to:
Bitdefender Antivirus Free
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8057
Title:
oval:org.cisecurity:def:8057: Vulnerability in Bitdefender Safepay before 23.0.10.34
Type:
Software
Bulletins:
CISEC:8057
CVE-2019-6736
Severity:
Medium
Description:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of tiscript. When processing the System.Exec method the application does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-7234.
Applies to:
Bitdefender Safepay
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8058
Title:
oval:org.cisecurity:def:8058: Vulnerability in Bitdefender Total Security 2020 prior to 24.9
Type:
Software
Bulletins:
CISEC:8058
CVE-2020-8095
Severity:
Low
Description:
A vulnerability in the improper handling of junctions before deletion in Bitdefender Total Security 2020 can allow an attacker to to trigger a denial of service on the affected device.
Applies to:
Bitdefender Total Security
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8059
Title:
oval:org.cisecurity:def:8059: Vulnerability in Bitdefender Endpoint Security Tools prior to 6.6.11.163
Type:
Software
Bulletins:
CISEC:8059
CVE-2019-17099
Severity:
Low
Description:
An Untrusted Search Path vulnerability in EPSecurityService.exe as used in Bitdefender Endpoint Security Tools versions prior to 6.6.11.163 allows an attacker to load an arbitrary DLL file from the search path. This issue affects: Bitdefender EPSecurityService.exe versions prior to 6.6.11.163.
Applies to:
Bitdefender Endpoint Security Tools
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8060
Title:
oval:org.cisecurity:def:8060: Vulnerability in Bitdefender Safepay before 23.0.10.34
Type:
Software
Bulletins:
CISEC:8060
CVE-2019-6738
Severity:
Medium
Description:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Bitdefender SafePay 23.0.10.34. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of TIScript. When processing the launch method the application does not properly validate a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability execute code in the context of the current process. Was ZDI-CAN-7250.
Applies to:
Bitdefender Safepay
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8061
Title:
oval:org.cisecurity:def:8061: Vulnerability in Bitdefender Total Security 21.0.24.62
Type:
Software
Bulletins:
CISEC:8061
CVE-2017-10950
Severity:
Medium
Description:
This vulnerability allows local attackers to execute arbitrary code on vulnerable installations of Bitdefender Total Security 21.0.24.62. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within processing of the 0x8000E038 IOCTL in the bdfwfpf driver. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker could leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-4776.
Applies to:
Bitdefender Total Security
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8062
Title:
oval:org.cisecurity:def:8062: Vulnerability in JetBrains Hub before 2018.4.11436
Type:
Software
Bulletins:
CISEC:8062
CVE-2019-14955
Severity:
Low
Description:
In JetBrains Hub versions earlier than 2018.4.11436, there was no option to force a user to change the password and no password expiration policy was implemented.
Applies to:
JetBrains Hub
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8064
Title:
oval:org.cisecurity:def:8064: Vulnerability in JetBrains Hub before 2020.1.12099
Type:
Software
Bulletins:
CISEC:8064
CVE-2020-11691
Severity:
Low
Description:
In JetBrains Hub before 2020.1.12099, content spoofing in the Hub OAuth error message was possible.
Applies to:
JetBrains Hub
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8065
Title:
oval:org.cisecurity:def:8065: Vulnerability in JetBrains Hub versions earlier than 2019.1.11738
Type:
Software
Bulletins:
CISEC:8065
CVE-2019-18360
Severity:
Low
Description:
In JetBrains Hub versions earlier than 2019.1.11738, username enumeration was possible through password recovery.
Applies to:
JetBrains Hub
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8066
Title:
oval:org.cisecurity:def:8066: Vulnerability in JetBrains Hub before 2018.4.11298
Type:
Software
Bulletins:
CISEC:8066
CVE-2019-12847
Severity:
Medium
Description:
In JetBrains Hub versions earlier than 2018.4.11298, the audit events for SMTPSettings show a cleartext password to the admin user. It is only relevant in cases where a password has not changed since 2017, and if the audit log still contains events from before that period.
Applies to:
JetBrains Hub
Created:
2020-08-21
Updated:
2020-08-21

ID:
CISEC:8253
Title:
oval:org.cisecurity:def:8253: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8253
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and 5.6.27 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8254
Title:
oval:org.cisecurity:def:8254: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12
Type:
Software
Bulletins:
CISEC:8254
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12 allows local users to affect availability via vectors related to Replication.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8255
Title:
oval:org.cisecurity:def:8255: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49 and 10.0.0 before 10.0.25 and 10.1.0 before 10.1.14
Type:
Software
Bulletins:
CISEC:8255
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49 and 10.0.0 before 10.0.25 and 10.1.0 before 10.1.14 allows local users to affect availability via vectors related to PS.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8256
Title:
oval:org.cisecurity:def:8256: Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier
Type:
Software
Bulletins:
CISEC:8256
CVE-2016-5617
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: Error Handling.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
mariadb
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8257
Title:
oval:org.cisecurity:def:8257: Vulnerability in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8257
CVE-2016-2047
Severity:
Medium
Description:
The ssl_verify_server_cert function in sql-common/client.c in MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10, Oracle MySQL, and Percona Server do not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via a "/CN=" string in a field in a certificate, as demonstrated by "/OU=/CN=bar.com/CN=foo.com."
Applies to:
MariaDB
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8258
Title:
oval:org.cisecurity:def:8258: Vulnerability in Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier
Type:
Software
Bulletins:
CISEC:8258
CVE-2013-1861
Severity:
Medium
Description:
MariaDB 5.5.x before 5.5.30, 5.3.x before 5.3.13, 5.2.x before 5.2.15, and 5.1.x before 5.1.68, and Oracle MySQL 5.1.69 and earlier, 5.5.31 and earlier, and 5.6.11 and earlier allows remote attackers to cause a denial of service (crash) via a crafted geometry feature that specifies a large number of points, which is not properly handled when processing the binary representation of this feature, related to a numeric calculation error.
Applies to:
MariaDB
MySQL Server 5.6
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8259
Title:
oval:org.cisecurity:def:8259: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12
Type:
Software
Bulletins:
CISEC:8259
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12 allows local users to affect availability via vectors related to PS.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8260
Title:
oval:org.cisecurity:def:8260: Vulnerability in Oracle MySQL before 5.7.3 and MariaDB before 5.5.44
Type:
Software
Bulletins:
CISEC:8260
CVE-2015-3152
Severity:
Medium
Description:
Oracle MySQL before 5.7.3, Oracle MySQL Connector/C (aka libmysqlclient) before 6.1.3, and MariaDB before 5.5.44 use the --ssl option to mean that SSL is optional, which allows man-in-the-middle attackers to spoof servers via a cleartext-downgrade attack, aka a "BACKRONYM" attack.
Applies to:
MariaDB
MySQL
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8261
Title:
oval:org.cisecurity:def:8261: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8261
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows local users to affect confidentiality, integrity, and availability via unknown vectors related to Client.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8262
Title:
oval:org.cisecurity:def:8262: Vulnerability in the MySQL Server component of Oracle MySQL
Type:
Software
Bulletins:
CISEC:8262
CVE-2012-5612
Severity:
Medium
Description:
Heap-based buffer overflow in Oracle MySQL 5.5.19 and other versions through 5.5.28, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (memory corruption and crash) and possibly execute arbitrary code, as demonstrated using certain variations of the (1) USE, (2) SHOW TABLES, (3) DESCRIBE, (4) SHOW FIELDS FROM, (5) SHOW COLUMNS FROM, (6) SHOW INDEX FROM, (7) CREATE TABLE, (8) DROP TABLE, (9) ALTER TABLE, (10) DELETE FROM, (11) UPDATE, and (12) SET PASSWORD commands.
Applies to:
MariaDB
MySQL Server 5.5
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8263
Title:
oval:org.cisecurity:def:8263: Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9
Type:
Software
Bulletins:
CISEC:8263
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.6.27 and earlier and MariaDB before 10.0.22 and 10.1.x before 10.1.9 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
Applies to:
MariaDB
MySQL Server 5.6
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8264
Title:
oval:org.cisecurity:def:8264: Vulnerability in MariaDB before 10.1.30 and 10.2.x before 10.2.10
Type:
Software
Bulletins:
CISEC:8264
CVE-2017-15365
Severity:
Medium
Description:
sql/event_data_objects.cc in MariaDB before 10.1.30 and 10.2.x before 10.2.10 and Percona XtraDB Cluster before 5.6.37-26.21-3 and 5.7.x before 5.7.19-29.22-3 allows remote authenticated users with SQL access to bypass intended access restrictions and replicate data definition language (DDL) statements to cluster nodes by leveraging incorrect ordering of DDL replication and ACL checking.
Applies to:
MariaDB
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8265
Title:
oval:org.cisecurity:def:8265: Vulnerability in Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions
Type:
Software
Bulletins:
CISEC:8265
CVE-2012-5614
Severity:
Medium
Description:
Oracle MySQL 5.1.67 and earlier and 5.5.29 and earlier, and MariaDB 5.5.28a and possibly other versions, allows remote authenticated users to cause a denial of service (mysqld crash) via a SELECT command with an UpdateXML command containing XML with a large number of unique, nested elements.
Applies to:
MariaDB
MySQL Server 5.1
MySQL Server 5.5
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8267
Title:
oval:org.cisecurity:def:8267: Vulnerability in Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier
Type:
Software
Bulletins:
CISEC:8267
CVE-2012-5615
Severity:
Medium
Description:
Oracle MySQL 5.5.38 and earlier, 5.6.19 and earlier, and MariaDB 5.5.28a, 5.3.11, 5.2.13, 5.1.66, and possibly other versions, generates different error messages with different time delays depending on whether a user name exists, which allows remote attackers to enumerate valid usernames.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8268
Title:
oval:org.cisecurity:def:8268: Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier
Type:
Software
Bulletins:
CISEC:8268
CVE-2016-5616
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.51 and earlier, 5.6.32 and earlier, and 5.7.14 and earlier allows local users to affect confidentiality, integrity, and availability via vectors related to Server: MyISAM.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
mariadb
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8269
Title:
oval:org.cisecurity:def:8269: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8269
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to privileges.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8270
Title:
oval:org.cisecurity:def:8270: Buffer overflow in Oracle MySQL and MariaDB before 5.5.35
Type:
Software
Bulletins:
CISEC:8270
Severity:
Low
Description:
Buffer overflow in client/mysql.cc in Oracle MySQL and MariaDB before 5.5.35 allows remote database servers to cause a denial of service (crash) and possibly execute arbitrary code via a long server version string.
Applies to:
MariaDB
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8271
Title:
oval:org.cisecurity:def:8271: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49 and 10.0.0 before 10.0.25 and 10.1.0 before 10.1.14
Type:
Software
Bulletins:
CISEC:8271
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49 and 10.0.0 before 10.0.25 and 10.1.0 before 10.1.14 allows local users to affect confidentiality via vectors related to DML.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8273
Title:
oval:org.cisecurity:def:8273: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12
Type:
Software
Bulletins:
CISEC:8273
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12 allows local users to affect integrity and availability via vectors related to DML.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8274
Title:
oval:org.cisecurity:def:8274: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8274
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Options.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8275
Title:
oval:org.cisecurity:def:8275: Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49 and 10.0.0 before 10.0.25 and 10.1.0 before 10.1.14
Type:
Software
Bulletins:
CISEC:8275
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.48 and earlier, 5.6.29 and earlier, and 5.7.11 and earlier and MariaDB before 5.5.49 and 10.0.0 before 10.0.25 and 10.1.0 before 10.1.14 allows local users to affect availability via vectors related to FTS.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8276
Title:
oval:org.cisecurity:def:8276: Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.0 before 10.0.25 and 10.1.0 before 10.1.14
Type:
Software
Bulletins:
CISEC:8276
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.6.29 and earlier and 5.7.11 and earlier and MariaDB 10.0.0 before 10.0.25 and 10.1.0 before 10.1.14 allows local users to affect availability via vectors related to InnoDB.
Applies to:
MariaDB
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8277
Title:
oval:org.cisecurity:def:8277: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12
Type:
Software
Bulletins:
CISEC:8277
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12 allows local users to affect availability via vectors related to DML.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8278
Title:
oval:org.cisecurity:def:8278: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8278
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect integrity via unknown vectors related to encryption.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8279
Title:
oval:org.cisecurity:def:8279: Vulnerability in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6
Type:
Software
Bulletins:
CISEC:8279
CVE-2012-2122
Severity:
Medium
Description:
sql/password.c in Oracle MySQL 5.1.x before 5.1.63, 5.5.x before 5.5.24, and 5.6.x before 5.6.6, and MariaDB 5.1.x before 5.1.62, 5.2.x before 5.2.12, 5.3.x before 5.3.6, and 5.5.x before 5.5.23, when running in certain environments with certain implementations of the memcmp function, allows remote attackers to bypass authentication by repeatedly authenticating with the same incorrect password, which eventually causes a token comparison to succeed due to an improperly-checked return value.
Applies to:
MariaDB
MySQL Server 5.1
MySQL Server 5.5
MySQL Server 5.6
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8280
Title:
oval:org.cisecurity:def:8280: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8280
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to DML.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8282
Title:
oval:org.cisecurity:def:8282: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8282
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
Applies to:
MariaDB
MySQL Server 5.5
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8283
Title:
oval:org.cisecurity:def:8283: Multiple SQL injection vulnerabilities in Oracle MySQL
Type:
Software
Bulletins:
CISEC:8283
CVE-2012-4414
Severity:
Medium
Description:
Multiple SQL injection vulnerabilities in the replication code in Oracle MySQL possibly before 5.5.29, and MariaDB 5.1.x through 5.1.62, 5.2.x through 5.2.12, 5.3.x through 5.3.7, and 5.5.x through 5.5.25, allow remote authenticated users to execute arbitrary SQL commands via vectors related to the binary log. NOTE: as of 20130116, Oracle has not commented on claims from a downstream vendor that the fix in MySQL 5.5.29 is incomplete.
Applies to:
MariaDB
MySQL Server 5.1
MySQL Server 5.5
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8284
Title:
oval:org.cisecurity:def:8284: Vulnerability in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB before 5.5.52, and 10.0.x before 10.0.28, and 10.1.x before 10.1.18
Type:
Software
Bulletins:
CISEC:8284
CVE-2016-6664
Severity:
Medium
Description:
mysqld_safe in Oracle MySQL through 5.5.51, 5.6.x through 5.6.32, and 5.7.x through 5.7.14; MariaDB before 5.5.52, and 10.0.x before 10.0.28, and 10.1.x before 10.1.18, when using file-based logging, allows local users with access to the mysql account to gain root privileges via a symlink attack on error logs and possibly other files.
Applies to:
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
mariadb
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8285
Title:
oval:org.cisecurity:def:8285: Vulnerability in MariaDB 10.4.7 through 10.4.11
Type:
Software
Bulletins:
CISEC:8285
CVE-2020-7221
Severity:
Low
Description:
mysql_install_db in MariaDB 10.4.7 through 10.4.11 allows privilege escalation from the mysql user account to root because chown and chmod are performed unsafely, as demonstrated by a symlink attack on a chmod 04755 of auth_pam_tool_dir/auth_pam_tool. NOTE: this does not affect the Oracle MySQL product, which implements mysql_install_db differently.
Applies to:
MariaDB
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8246
Title:
oval:org.cisecurity:def:8246: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12
Type:
Software
Bulletins:
CISEC:8246
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12 allows local users to affect availability via vectors related to DDL.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8247
Title:
oval:org.cisecurity:def:8247: Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14
Type:
Software
Bulletins:
CISEC:8247
CVE-2012-5627
Severity:
Medium
Description:
Oracle MySQL and MariaDB 5.5.x before 5.5.29, 5.3.x before 5.3.12, and 5.2.x before 5.2.14 does not modify the salt during multiple executions of the change_user command within the same connection which makes it easier for remote authenticated users to conduct brute force password guessing attacks.
Applies to:
MariaDB
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8248
Title:
oval:org.cisecurity:def:8248: Vulnerability in the MySQL Server component of Oracle MySQL
Type:
Software
Bulletins:
CISEC:8248
CVE-2012-5611
Severity:
Medium
Description:
Stack-based buffer overflow in the acl_get function in Oracle MySQL 5.5.19 and other versions through 5.5.28, and 5.1.53 and other versions through 5.1.66, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command.
Applies to:
MariaDB
MySQL Server 5.1
MySQL Server 5.5
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8249
Title:
oval:org.cisecurity:def:8249: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8249
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via vectors related to UDF.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8250
Title:
oval:org.cisecurity:def:8250: Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12
Type:
Software
Bulletins:
CISEC:8250
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.47 and earlier, 5.6.28 and earlier, and 5.7.10 and earlier and MariaDB before 5.5.48 and 10.0.0 before 10.0.24 and 10.1.0 before 10.1.12 allows local users to affect confidentiality and availability via vectors related to MyISAM.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8251
Title:
oval:org.cisecurity:def:8251: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8251
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to Optimizer.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8252
Title:
oval:org.cisecurity:def:8252: Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10
Type:
Software
Bulletins:
CISEC:8252
Severity:
Low
Description:
Unspecified vulnerability in Oracle MySQL 5.5.46 and earlier, 5.6.27 and earlier, and 5.7.9 and MariaDB before 5.5.47, 10.0.x before 10.0.23, and 10.1.x before 10.1.10 allows remote authenticated users to affect availability via unknown vectors related to InnoDB.
Applies to:
MariaDB
MySQL Server 5.5
MySQL Server 5.6
MySQL Server 5.7
Created:
2020-08-14
Updated:
2020-09-11

ID:
CISEC:8012
Title:
oval:org.cisecurity:def:8012: Windows Font Driver Host Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8012
CVE-2020-1355
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system. The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8013
Title:
oval:org.cisecurity:def:8013: Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8013
CVE-2020-1381
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8014
Title:
oval:org.cisecurity:def:8014: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8014
CVE-2020-1401
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8015
Title:
oval:org.cisecurity:def:8015: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8015
CVE-2020-1414
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8016
Title:
oval:org.cisecurity:def:8016: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8016
CVE-2020-1419
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows kernel initializes memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8017
Title:
oval:org.cisecurity:def:8017: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8017
CVE-2020-1422
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8018
Title:
oval:org.cisecurity:def:8018: Windows Picker Platform Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8018
CVE-2020-1363
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Picker Platform improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Picker Platform handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8019
Title:
oval:org.cisecurity:def:8019: Windows Error Reporting Manager Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8019
CVE-2020-1429
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash. An attacker who successfully exploited this vulnerability could delete a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows Error Reporting manager handles process crashes.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8020
Title:
oval:org.cisecurity:def:8020: Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8020
CVE-2020-1351
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows Graphics Component handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8021
Title:
oval:org.cisecurity:def:8021: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8021
CVE-2020-1370
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8022
Title:
oval:org.cisecurity:def:8022: Windows WalletService Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8022
CVE-2020-1362
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7958
Title:
oval:org.cisecurity:def:7958: Windows Update Stack Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7958
CVE-2020-1424
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows Update Stack handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7959
Title:
oval:org.cisecurity:def:7959: Windows WalletService Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7959
CVE-2020-1361
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the WalletService handles memory. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by correcting how the WalletService handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7960
Title:
oval:org.cisecurity:def:7960: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7960
CVE-2020-1249
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7961
Title:
oval:org.cisecurity:def:7961: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7961
CVE-2020-1411
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7962
Title:
oval:org.cisecurity:def:7962: Windows Function Discovery Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7962
CVE-2020-1085
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Function Discovery Service properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7963
Title:
oval:org.cisecurity:def:7963: Windows Print Workflow Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7963
CVE-2020-1366
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Print Workflow Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could gain elevated privileges and break out of the AppContainer sandbox. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability. The security update addresses the vulnerability by correcting how the Windows Print Workflow Service handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7964
Title:
oval:org.cisecurity:def:7964: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7964
CVE-2020-1367
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7965
Title:
oval:org.cisecurity:def:7965: Local Security Authority Subsystem Service Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7965
CVE-2020-1267
Severity:
Low
Description:
This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS) caused when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system. The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7966
Title:
oval:org.cisecurity:def:7966: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7966
CVE-2020-1336
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7967
Title:
oval:org.cisecurity:def:7967: Windows AppX Deployment Extensions Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7967
CVE-2020-1431
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows AppX Deployment Extensions improperly performs privilege management, resulting in access to system files. To exploit this vulnerability, an authenticated attacker would need to run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how AppX Deployment Extensions manages privileges.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7968
Title:
oval:org.cisecurity:def:7968: Windows UPnP Device Host Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7968
CVE-2020-1354
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows UPnP Device Host handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7969
Title:
oval:org.cisecurity:def:7969: Windows COM Server Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7969
CVE-2020-1375
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how the Windows COM Server creates COM objects.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7970
Title:
oval:org.cisecurity:def:7970: Windows SharedStream Library Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7970
CVE-2020-1463
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the SharedStream Library handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the SharedStream Library properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7971
Title:
oval:org.cisecurity:def:7971: Windows ActiveX Installer Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7971
CVE-2020-1402
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows ActiveX Installer Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows ActiveX Installer Service handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7972
Title:
oval:org.cisecurity:def:7972: Windows Error Reporting Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7972
CVE-2020-1420
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Error Reporting improperly handles file operations. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to disclose information. The security update addresses the vulnerability by correcting how Windows Error Reporting handles file operations.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7973
Title:
oval:org.cisecurity:def:7973: Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7973
CVE-2020-1405
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions. An attacker who successfully exploited this vulnerability could bypass access restrictions to delete files. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and remove files. The security update addresses the vulnerability by correcting the how Windows MDM Diagnostics handles files.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7974
Title:
oval:org.cisecurity:def:7974: Windows System Events Broker Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7974
CVE-2020-1357
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows System Events Broker improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows System Events Broker properly handles file operations.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7975
Title:
oval:org.cisecurity:def:7975: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7975
CVE-2020-1353
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7976
Title:
oval:org.cisecurity:def:7976: Windows Storage Services Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7976
CVE-2020-1347
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Storage Services improperly handle file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Storage Services properly handle file operations.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7977
Title:
oval:org.cisecurity:def:7977: Windows Imaging Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7977
CVE-2020-1397
Severity:
Low
Description:
An information disclosure vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system. There are multiple ways an attacker could exploit this vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website designed to exploit this vulnerability and then convince a user to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or instant message that takes users to the attacker's website or by opening an attachment sent through email. In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit this vulnerability and then convince a user to open the document file. The security update addresses the vulnerability by correcting how the Windows Imaging Component handles objects in the memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7978
Title:
oval:org.cisecurity:def:7978: Connected User Experiences and Telemetry Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7978
CVE-2020-1386
Severity:
Low
Description:
An information vulnerability exists when Windows Connected User Experiences and Telemetry Service improperly discloses file information. Successful exploitation of the vulnerability could allow the attacker to read any file on the file system. To exploit the vulnerability, an attacker would have to log onto an affected system and run a specially crafted application. The update addresses the vulnerability by changing the way Windows Connected User Experiences and Telemetry Service discloses file information.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7979
Title:
oval:org.cisecurity:def:7979: Windows Network Connections Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7979
CVE-2020-1428
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Network Connections Service properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7980
Title:
oval:org.cisecurity:def:7980: Windows Event Logging Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7980
CVE-2020-1371
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Event Logging Service handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7981
Title:
oval:org.cisecurity:def:7981: Windows Network Connections Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7981
CVE-2020-1427
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Network Connections Service properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7982
Title:
oval:org.cisecurity:def:7982: Microsoft Graphics Components Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7982
CVE-2020-1412
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7983
Title:
oval:org.cisecurity:def:7983: Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7983
CVE-2020-1372
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles objects in memory. An attacker who successfully exploited this vulnerability could bypass access restrictions to delete files. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and remove files. The security update addresses the vulnerability by correcting the how Windows MDM Diagnostics handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7984
Title:
oval:org.cisecurity:def:7984: GDI+ Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7984
CVE-2020-1435
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message. In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file. The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7985
Title:
oval:org.cisecurity:def:7985: Windows Font Library Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7985
CVE-2020-1436
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email. In a file sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7986
Title:
oval:org.cisecurity:def:7986: Windows Mobile Device Management Diagnostics Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7986
CVE-2020-1330
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions. An attacker who successfully exploited this vulnerability could bypass access restrictions to read files. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and access files. The security update addresses the vulnerability by correcting the how Windows MDM Diagnostics handles files.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7987
Title:
oval:org.cisecurity:def:7987: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7987
CVE-2020-1404
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7988
Title:
oval:org.cisecurity:def:7988: Windows Push Notification Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7988
CVE-2020-1387
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way the Windows Push Notification Service handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how the Windows Push Notification Service handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7989
Title:
oval:org.cisecurity:def:7989: Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7989
CVE-2020-1384
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Cryptography Next Generation (CNG) Key Isolation service improperly handles memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CNG Key Isolation Service handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7990
Title:
oval:org.cisecurity:def:7990: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7990
CVE-2020-1413
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7991
Title:
oval:org.cisecurity:def:7991: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7991
CVE-2020-1415
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7992
Title:
oval:org.cisecurity:def:7992: Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7992
CVE-2020-1359
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Cryptography Next Generation (CNG) Key Isolation service improperly handles memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows CNG Key Isolation Service handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7993
Title:
oval:org.cisecurity:def:7993: Windows Spatial Data Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7993
CVE-2020-1441
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Spatial Data Service improperly handles objects in memory. An attacker could exploit the vulnerability to overwrite or modify a protected file leading to a privilege escalation. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by addressing how the Windows Spatial Data Service handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7994
Title:
oval:org.cisecurity:def:7994: Windows Credential Enrollment Manager Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7994
CVE-2020-1368
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Credential Enrollment Manager service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Credential Enrollment Manager service properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7995
Title:
oval:org.cisecurity:def:7995: Windows Network Connections Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7995
CVE-2020-1390
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Network Connections Service properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7996
Title:
oval:org.cisecurity:def:7996: Windows USO Core Worker Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7996
CVE-2020-1352
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows USO Core Worker improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows USO Core Worker handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7997
Title:
oval:org.cisecurity:def:7997: Windows WalletService Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7997
CVE-2020-1369
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7998
Title:
oval:org.cisecurity:def:7998: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7998
CVE-2020-1468
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7999
Title:
oval:org.cisecurity:def:7999: Group Policy Services Policy Processing Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7999
CVE-2020-1333
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Group Policy Services Policy Processing improperly handle reparse points. An attacker who successfully exploited this vulnerability could overwrite a targeted file that would normally require elevated permissions. To exploit the vulnerability, an attacker would first have to log on to a system and create folders that will be used by Group Policy logging and tracing. The attacker could then run a specially crafted application to target a file for overwriting, and then wait for the administrator to apply the Group Policy logging and tracing settings on the vulnerable system. The security update addresses the vulnerability by correcting how Group Policy Services Policy Processing performs data logging.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8000
Title:
oval:org.cisecurity:def:8000: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8000
CVE-2020-1394
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Geolocation Framework handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Geolocation Framework properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8001
Title:
oval:org.cisecurity:def:8001: Windows Credential Picker Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8001
CVE-2020-1385
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Credential Picker handles objects in memory. An attacker who successfully exploited the vulnerability could allow an application with limited privileges on an affected system to execute code at a medium integrity level. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows Credential Picker handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8002
Title:
oval:org.cisecurity:def:8002: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8002
CVE-2020-1392
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Delivery Optimization service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows Delivery Optimization service handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8003
Title:
oval:org.cisecurity:def:8003: Remote Desktop Client Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8003
CVE-2020-1374
Severity:
Low
Description:
A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to have control of a server and then convince a user to connect to it. An attacker would have no way of forcing a user to connect to the malicious server, they would need to trick the user into connecting via social engineering, DNS poisoning or using a Man in the Middle (MITM) technique. An attacker could also compromise a legitimate server, host malicious code on it, and wait for the user to connect. The update addresses the vulnerability by correcting how the Windows Remote Desktop Client handles connection requests.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8004
Title:
oval:org.cisecurity:def:8004: Windows Address Book Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8004
CVE-2020-1410
Severity:
Low
Description:
A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files. To exploit the vulnerability, an attacker could send a malicious vcard that a victim opens using Windows Address Book (WAB). After successfully exploiting the vulnerability, an attacker could gain execution on a victim system. The security update addresses the vulnerability by correcting the way Windows Address Book handles bound checking.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8005
Title:
oval:org.cisecurity:def:8005: Microsoft Graphics Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8005
CVE-2020-1408
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or instant message that takes users to the attacker's website, or by opening an attachment sent through email. In a file-sharing attack scenario, an attacker could provide a specially crafted document file designed to exploit the vulnerability and then convince users to open the document file. The security update addresses the vulnerability by correcting how the Windows font library handles embedded fonts.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8006
Title:
oval:org.cisecurity:def:8006: Windows Profile Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8006
CVE-2020-1360
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Profile Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Profile Service properly handles file operations.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8007
Title:
oval:org.cisecurity:def:8007: Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8007
CVE-2020-1382
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8008
Title:
oval:org.cisecurity:def:8008: Windows Network Connections Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8008
CVE-2020-1373
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Network Connections Service properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8009
Title:
oval:org.cisecurity:def:8009: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8009
CVE-2020-1395
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Speech Brokered API handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Speech Brokered API properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8010
Title:
oval:org.cisecurity:def:8010: Windows WalletService Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:8010
CVE-2020-1364
Severity:
Low
Description:
A denial of service vulnerability exists in the way that the WalletService handles files. An attacker who successfully exploited the vulnerability could corrupt system files. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by correcting how the WalletService handles files.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8011
Title:
oval:org.cisecurity:def:8011: Windows Network Connections Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8011
CVE-2020-1438
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Network Connections Service properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8023
Title:
oval:org.cisecurity:def:8023: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8023
CVE-2020-1388
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the psmsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the psmsrv.dll properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8024
Title:
oval:org.cisecurity:def:8024: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8024
CVE-2020-1400
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8025
Title:
oval:org.cisecurity:def:8025: Windows Sync Host Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8025
CVE-2020-1434
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Sync Host Service handles objects in memory. An attacker who successfully exploited the vulnerability could allow an application with limited privileges on an affected system to execute code at a medium integrity level. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows Sync Host Service handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8026
Title:
oval:org.cisecurity:def:8026: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8026
CVE-2020-1426
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8027
Title:
oval:org.cisecurity:def:8027: Windows iSCSI Target Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8027
CVE-2020-1356
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows iSCSI Target Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. To exploit the vulnerability, an attacker would first need code execution on a victim system. An attacker could then run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows iSCSI Target Service properly handles file operations.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8028
Title:
oval:org.cisecurity:def:8028: Windows Resource Policy Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8028
CVE-2020-1358
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Resource Policy component improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to disclose information about the victim system's memory layout. The security update addresses the vulnerability by correcting how the Windows Resource Policy component handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8029
Title:
oval:org.cisecurity:def:8029: Windows Network Location Awareness Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8029
CVE-2020-1437
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory. An attacker who successfully exploited the vulnerability could allow an application with limited privileges on an affected system to execute code at a medium integrity level. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows Network Location Awareness Service handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8030
Title:
oval:org.cisecurity:def:8030: Windows DNS Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8030
CVE-2020-1350
Severity:
Low
Description:
A remote code execution vulnerability exists in Windows Domain Name System servers when they fail to properly handle requests. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account. Windows servers that are configured as DNS servers are at risk from this vulnerability. To exploit the vulnerability, an unauthenticated attacker could send malicious requests to a Windows DNS server. The update addresses the vulnerability by modifying how Windows DNS servers handle requests.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8031
Title:
oval:org.cisecurity:def:8031: LNK Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8031
CVE-2020-1421
Severity:
Low
Description:
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The attacker could present to the user a removable drive, or remote share, that contains a malicious .LNK file and an associated malicious binary. When the user opens this drive(or remote share) in Windows Explorer, or any other application that parses the .LNK file, the malicious binary will execute code of the attacker's choice, on the target system. The security update addresses the vulnerability by correcting the processing of shortcut LNK references.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8032
Title:
oval:org.cisecurity:def:8032: Windows Event Logging Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8032
CVE-2020-1365
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Event Logging Service handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8033
Title:
oval:org.cisecurity:def:8033: Windows UPnP Device Host Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8033
CVE-2020-1430
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows UPnP Device Host handles memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8034
Title:
oval:org.cisecurity:def:8034: Windows Agent Activation Runtime Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8034
CVE-2020-1391
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Agent Activation Runtime (AarSvc) fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application. The update addresses the vulnerability by correcting how the Windows Agent Activation Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8035
Title:
oval:org.cisecurity:def:8035: Windows ALPC Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8035
CVE-2020-1396
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to ALPC.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8036
Title:
oval:org.cisecurity:def:8036: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:8036
CVE-2020-1389
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows kernel initializes memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8037
Title:
oval:org.cisecurity:def:8037: Windows WalletService Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8037
CVE-2020-1344
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8038
Title:
oval:org.cisecurity:def:8038: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:8038
CVE-2020-1407
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8039
Title:
oval:org.cisecurity:def:8039: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8039
CVE-2020-1399
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8040
Title:
oval:org.cisecurity:def:8040: Windows Diagnostics Hub Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8040
CVE-2020-1418
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Diagnostics Execution Service fails to properly sanitize input, leading to an unsecure library-loading behavior. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Windows Diagnostics Execution Service sanitizes input, to help preclude unintended elevated system privileges.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8041
Title:
oval:org.cisecurity:def:8041: Windows Lockscreen Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8041
CVE-2020-1398
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Lockscreen fails to properly handle Ease of Access dialog. An attacker who successfully exploited the vulnerability could execute commands with elevated permissions. The security update addresses the vulnerability by ensuring that the Ease of Access dialog is handled properly.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:8042
Title:
oval:org.cisecurity:def:8042: Windows Network List Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:8042
CVE-2020-1406
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network List Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Network List Service properly handles objects in memory.
Applies to:
Created:
2020-08-13
Updated:
2020-08-13

ID:
CISEC:7934
Title:
oval:org.cisecurity:def:7934: Vulnerability in Avira Antivirus before 15.0.2003.1821
Type:
Software
Bulletins:
CISEC:7934
CVE-2020-12254
Severity:
Low
Description:
Avira Antivirus before 15.0.2003.1821 on Windows allows privilege escalation or a denial of service via abuse of a symlink.
Applies to:
Avira Antivirus
Created:
2020-07-31
Updated:
2020-07-31

ID:
CISEC:7935
Title:
oval:org.cisecurity:def:7935: Vulnerability in Avira Antivirus before 8.3.54.138
Type:
Software
Bulletins:
CISEC:7935
CVE-2020-9320
Severity:
Low
Description:
Avira AV Engine before 8.3.54.138 allows virus-detection bypass via a crafted ISO archive. This affects versions before 8.3.54.138 of Antivirus for Endpoint, Antivirus for Small Business, Exchange Security (Gateway), Internet Security Suite for Windows, Prime, Free Security Suite for Windows, and Cross Platform Anti-malware SDK.
Applies to:
Avira Antivirus
Created:
2020-07-31
Updated:
2020-07-31

ID:
CISEC:7936
Title:
oval:org.cisecurity:def:7936: Vulnerability in Avira Antivirus through 15.0.2005.1866
Type:
Software
Bulletins:
CISEC:7936
CVE-2020-12680
Severity:
Low
Description:
Avira Free Antivirus through 15.0.2005.1866 allows local users to discover user credentials. The functions of the executable file Avira.PWM.NativeMessaging.exe are aimed at collecting credentials stored in Chrome, Firefox, Opera, and Edge. The executable does not verify the calling program and thus a request such as fetchChromePasswords or fetchCredentials will succeed. NOTE: some third parties have stated that this is "not a vulnerability."
Applies to:
Avira Antivirus
Created:
2020-07-31
Updated:
2020-07-31

ID:
CISEC:7937
Title:
oval:org.cisecurity:def:7937: Vulnerability in Avira Antivirus
Type:
Software
Bulletins:
CISEC:7937
CVE-2019-18568
Severity:
Low
Description:
Avira Free Antivirus 15.0.1907.1514 is prone to a local privilege escalation through the execution of kernel code from a restricted user.
Applies to:
Avira Antivirus
Created:
2020-07-31
Updated:
2020-07-31

ID:
CISEC:7939
Title:
oval:org.cisecurity:def:7939: Vulnerability in Avira Antivirus
Type:
Software
Bulletins:
CISEC:7939
CVE-2013-4602
Severity:
Low
Description:
A Denial of Service (infinite loop) vulnerability exists in Avira AntiVir Engine before 8.2.12.58 via an unspecified function in the PDF Scanner Engine.
Applies to:
Avira Antivirus
Created:
2020-07-31
Updated:
2020-07-31

ID:
CISEC:7932
Title:
oval:org.cisecurity:def:7932: Vulnerability in Avira Antivirus
Type:
Software
Bulletins:
CISEC:7932
CVE-2016-10402
Severity:
High
Description:
Avira Antivirus engine versions before 8.3.36.60 allow remote code execution as NT AUTHORITY\SYSTEM via a section header with a very large relative virtual address in a PE file, causing an integer overflow and heap-based buffer underflow.
Applies to:
Avira Antivirus
Created:
2020-07-31
Updated:
2020-07-31

ID:
CISEC:7933
Title:
oval:org.cisecurity:def:7933: Vulnerability in Avira Antivirus before 15.0.2004.1825
Type:
Software
Bulletins:
CISEC:7933
CVE-2020-8961
Severity:
Low
Description:
An issue was discovered in Avira Free-Antivirus before 15.0.2004.1825. The Self-Protection feature does not prohibit a write operation from an external process. Thus, code injection can be used to turn off this feature. After that, one can construct an event that will modify a file at a specific location, and pass this event to the driver, thereby defeating the anti-virus functionality.
Applies to:
Avira Antivirus
Created:
2020-07-31
Updated:
2020-07-31

ID:
CISEC:7904
Title:
oval:org.cisecurity:def:7904: Vulnerability in Kaspersky Password Manager before 8.0.6.538
Type:
Software
Bulletins:
CISEC:7904
CVE-2018-6306
Severity:
Medium
Description:
Unauthorized code execution from specific DLL and is known as DLL Hijacking attack in Kaspersky Password Manager versions before 8.0.6.538.
Applies to:
Kaspersky Password Manager
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7905
Title:
oval:org.cisecurity:def:7905: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7905
Severity:
Low
Description:
Kaspersky Lab has fixed a number of vulnerabilities found by Cisco TALOS. All these vulnerabilities could have been exploited only if machine already contained malicious program. TALOS-CAN-0166: a specially crafted call can cause an access violation in one of products drivers resulting in local denial of service.
Applies to:
Kaspersky Anti-Virus
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7906
Title:
oval:org.cisecurity:def:7906: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7906
Severity:
Low
Description:
Kaspersky Lab has fixed vulnerability TALOS-CAN-0169 in Kaspersky Anti-Virus products. This vulnerability could have been exploited only if machine already contained malicious program that might used a bug in one of the products drivers to cause an access violation in it that results in local system denial of service.
Applies to:
Kaspersky Anti-Virus
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7908
Title:
oval:org.cisecurity:def:7908: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7908
CVE-2016-4329
Severity:
Low
Description:
A local denial of service vulnerability exists in window broadcast message handling functionality of Kaspersky Anti-Virus software. Sending certain unhandled window messages, an attacker can cause application termination and in the same way bypass KAV self-protection mechanism.
Applies to:
Kaspersky Anti-Virus
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7912
Title:
oval:org.cisecurity:def:7912: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7912
CVE-2015-8691
Severity:
Low
Description:
Kaspersky Lab has fixed vulnerability CVE-2015-8691 in Kaspersky Anti-Virus products which may lead to local privilege escalation. This vulnerability could have been exploited only if host machine already contained malicious program that might used a bug in one of the products drivers to write to arbitrary path without overwrite existing file.
Applies to:
Kaspersky Anti-Virus
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7916
Title:
oval:org.cisecurity:def:7916: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7916
Severity:
Low
Description:
Kaspersky Lab has fixed a number of vulnerabilities found by Cisco TALOS. All these vulnerabilities could have been exploited only if machine already contained malicious program. TALOS-CAN-0168: a specially crafted call can cause the one of the products driver to return out of bounds kernel memory, potentially leaking sensitive information.
Applies to:
Kaspersky Anti-Virus
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7919
Title:
oval:org.cisecurity:def:7919: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7919
Severity:
Low
Description:
Kaspersky Lab has fixed a number of vulnerabilities found by Cisco TALOS. All these vulnerabilities could have been exploited only if machine already contained malicious program. TALOS-CAN-0167: a specially crafted call can cause an access violation in one of products drivers resulting in local denial of service.
Applies to:
Kaspersky Anti-Virus
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7921
Title:
oval:org.cisecurity:def:7921: Vulnerability in Kaspersky Embedded Systems Security 1.2.0.300 and 2.0.0.385
Type:
Software
Bulletins:
CISEC:7921
CVE-2017-12823
Severity:
Medium
Description:
Kernel pool memory corruption in one of drivers in Kaspersky Embedded Systems Security version 1.2.0.300 leads to local privilege escalation.
Applies to:
Kaspersky Embedded Systems Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7923
Title:
oval:org.cisecurity:def:7923: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7923
Severity:
Low
Description:
Information Disclosure in Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security versions up to 2019 could potentially disclose unique Product ID by forcing victim to visit a specially crafted webpage (for example, via clicking phishing link).
Applies to:
Kaspersky Anti-Virus
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7924
Title:
oval:org.cisecurity:def:7924: Vulnerability in AhnLab V3 Internet Security 2011.01.18.00, avast! Antivirus 4.8.1351.0 and 5.0.677.0, Kaspersky Anti-Virus 7.0.0.125, ClamAV 0.96.4, Emsisoft Anti-Malware 5.1.0.1
Type:
Software
Bulletins:
CISEC:7924
CVE-2012-1459
Severity:
Medium
Description:
The TAR file parser in AhnLab V3 Internet Security 2011.01.18.00, avast! Antivirus 4.8.1351.0 and 5.0.677.0, Kaspersky Anti-Virus 7.0.0.125, ClamAV 0.96.4, Emsisoft Anti-Malware 5.1.0.1 allows remote attackers to bypass malware detection via a TAR archive entry with a length field corresponding to that entire entry, plus part of the header of the next entry. NOTE: this may later be SPLIT into multiple CVEs if additional information is published showing that the error occurred independently in different TAR parser implementations.
Applies to:
AVG Antivirus
AhnLab V3 Internet Security
Avast! AntiVirus
ClamAV
Emsisoft Anti-Malware
Kaspersky Anti-Virus
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7925
Title:
oval:org.cisecurity:def:7925: Vulnerability in Kaspersky products
Type:
Software
Bulletins:
CISEC:7925
CVE-2019-15689
Severity:
Low
Description:
Kaspersky Secure Connection, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Security Cloud prior to version 2020 patch E have bug that allows a local user to execute arbitrary code via execution compromised file placed by an attacker with administrator rights. No privilege escalation. Possible whitelisting bypass some of the security products.
Applies to:
Kaspersky Internet Security
Kaspersky Secure Connection
Kaspersky Security Cloud
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7927
Title:
oval:org.cisecurity:def:7927: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7927
CVE-2019-15685
Severity:
Low
Description:
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component allowed an attacker remotely disable such product's security features as private browsing and anti-banner. Bypass.
Applies to:
Kaspersky Anti-Virus
Kaspersky Free
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7928
Title:
oval:org.cisecurity:def:7928: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7928
CVE-2019-15688
Severity:
Low
Description:
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component did not adequately inform the user about the threat of redirecting to an untrusted site. Bypass.
Applies to:
Kaspersky Anti-Virus
Kaspersky Free
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7929
Title:
oval:org.cisecurity:def:7929: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7929
CVE-2019-15687
Severity:
Low
Description:
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component was vulnerable to remote disclosure of various information about the user's system (like Windows version and version of the product, host unique ID). Information Disclosure.
Applies to:
Kaspersky Anti-Virus
Kaspersky Free
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7930
Title:
oval:org.cisecurity:def:7930: Vulnerability in Kaspersky Anti-Virus products
Type:
Software
Bulletins:
CISEC:7930
CVE-2019-15686
Severity:
Low
Description:
Kaspersky Anti-Virus, Kaspersky Internet Security, Kaspersky Total Security, Kaspersky Free Anti-Virus, Kaspersky Small Office Security, Kaspersky Security Cloud up to 2020, the web protection component allowed an attacker remotely disable various anti-virus protection features. DoS, Bypass.
Applies to:
Kaspersky Anti-Virus
Kaspersky Free
Kaspersky Internet Security
Kaspersky Total Security
Created:
2020-07-24
Updated:
2020-07-24

ID:
CISEC:7830
Title:
oval:org.cisecurity:def:7830: Vulnerability in Blink, as used in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7830
CVE-2015-1257
Severity:
High
Description:
platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7878
Title:
oval:org.cisecurity:def:7878: Use-after-free vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7878
CVE-2015-1220
Severity:
Medium
Description:
Use-after-free vulnerability in the GIFImageReader::parseData function in platform/image-decoders/gif/GIFImageReader.cpp in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted frame size in a GIF image.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7879
Title:
oval:org.cisecurity:def:7879: Use-after-free vulnerability in Google Chrome before 45.0.2454.85
Type:
Web
Bulletins:
CISEC:7879
CVE-2015-1294
Severity:
High
Description:
Use-after-free vulnerability in the SkMatrix::invertNonIdentity function in core/SkMatrix.cpp in Skia, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering the use of matrix elements that lead to an infinite result during an inversion calculation.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7880
Title:
oval:org.cisecurity:def:7880: Use-after-free vulnerability in the Speech subsystem in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7880
CVE-2015-1251
Severity:
Medium
Description:
Use-after-free vulnerability in the SpeechRecognitionClient implementation in the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote attackers to execute arbitrary code via a crafted document.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7881
Title:
oval:org.cisecurity:def:7881: Vulnerability in Google Chrome before 45.0.2454.85
Type:
Web
Bulletins:
CISEC:7881
CVE-2015-1291
Severity:
Medium
Description:
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 45.0.2454.85, does not check whether a node is expected, which allows remote attackers to bypass the Same Origin Policy or cause a denial of service (DOM tree corruption) via a web site with crafted JavaScript code and IFRAME elements.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7882
Title:
oval:org.cisecurity:def:7882: Use-after-free vulnerability IndexedDB implementation in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7882
CVE-2015-1276
Severity:
High
Description:
Use-after-free vulnerability in content/browser/indexed_db/indexed_db_backing_store.cc in the IndexedDB implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging an abort action before a certain write operation.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7883
Title:
oval:org.cisecurity:def:7883: Vulnerability in Blink, as used in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7883
CVE-2015-1236
Severity:
Medium
Description:
The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7903
Title:
oval:org.cisecurity:def:7903: Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7903
CVE-2015-1249
Severity:
High
Description:
Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.90 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7831
Title:
oval:org.cisecurity:def:7831: Use-after-free vulnerability in Blink, as used in Google Chrome before 45.0.2454.85
Type:
Web
Bulletins:
CISEC:7831
CVE-2015-1299
Severity:
High
Description:
Use-after-free vulnerability in the shared-timer implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging erroneous timer firing, related to ThreadTimers.cpp and Timer.cpp.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7832
Title:
oval:org.cisecurity:def:7832: Vulnerability in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7832
CVE-2015-1247
Severity:
Medium
Description:
The SearchEngineTabHelper::OnPageHasOSDD function in browser/ui/search_engines/search_engine_tab_helper.cc in Google Chrome before 42.0.2311.90 does not prevent use of a file: URL for an OpenSearch descriptor XML document, which might allow remote attackers to obtain sensitive information from local files via a crafted (1) http or (2) https web site.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7834
Title:
oval:org.cisecurity:def:7834: Heap-based buffer overflow in PDFium in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7834
CVE-2015-1273
Severity:
Medium
Description:
Heap-based buffer overflow in j2k.c in OpenJPEG before r3002, as used in PDFium in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid JPEG2000 data in a PDF document.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7835
Title:
oval:org.cisecurity:def:7835: Vulnerability in Blink, as used in Google Chrome before 40.0.2214.111
Type:
Web
Bulletins:
CISEC:7835
CVE-2015-1210
Severity:
Medium
Description:
The V8ThrowException::createDOMException function in bindings/core/v8/V8ThrowException.cpp in the V8 bindings in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, does not properly consider frame access restrictions during the throwing of an exception, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7836
Title:
oval:org.cisecurity:def:7836: Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7836
CVE-2015-1265
Severity:
High
Description:
Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7837
Title:
oval:org.cisecurity:def:7837: Vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7837
CVE-2015-1278
Severity:
Medium
Description:
content/browser/web_contents/web_contents_impl.cc in Google Chrome before 44.0.2403.89 does not ensure that a PDF document's modal dialog is closed upon navigation to an interstitial page, which allows remote attackers to spoof URLs via a crafted document, as demonstrated by the alert_dialog.pdf document.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7838
Title:
oval:org.cisecurity:def:7838: Vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7838
CVE-2015-1280
Severity:
High
Description:
SkPictureShader.cpp in Skia, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging access to a renderer process and providing crafted serialized data.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7839
Title:
oval:org.cisecurity:def:7839: Vulnerability in Google Chrome before 45.0.2454.85
Type:
Web
Bulletins:
CISEC:7839
CVE-2015-1296
Severity:
Medium
Description:
The UnescapeURLWithAdjustmentsImpl implementation in net/base/escape.cc in Google Chrome before 45.0.2454.85 does not prevent display of Unicode LOCK characters in the omnibox, which makes it easier for remote attackers to spoof the SSL lock icon by placing one of these characters at the end of a URL, as demonstrated by the omnibox in localizations for right-to-left languages.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7840
Title:
oval:org.cisecurity:def:7840: Vulnerability in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7840
CVE-2015-1244
Severity:
Medium
Description:
The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7841
Title:
oval:org.cisecurity:def:7841: Vulnerability in Google Chrome before 43.0.2357.130
Type:
Web
Bulletins:
CISEC:7841
CVE-2015-1266
Severity:
Medium
Description:
content/browser/webui/content_web_ui_controller_factory.cc in Google Chrome before 43.0.2357.130 does not properly consider the scheme in determining whether a URL is associated with a WebUI SiteInstance, which allows remote attackers to bypass intended access restrictions via a similar URL, as demonstrated by use of http://gpu when there is a WebUI class for handling chrome://gpu requests.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7842
Title:
oval:org.cisecurity:def:7842: Integer overflow in Skia, as used in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7842
CVE-2015-1214
Severity:
High
Description:
Integer overflow in the SkAutoSTArray implementation in include/core/SkTemplates.h in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a reset action with a large count value, leading to an out-of-bounds write operation.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7843
Title:
oval:org.cisecurity:def:7843: Integer overflow in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7843
CVE-2015-1279
Severity:
High
Description:
Integer overflow in the CJBig2_Image::expand function in fxcodec/jbig2/JBig2_Image.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via large height and stride values.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7844
Title:
oval:org.cisecurity:def:7844: Vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7844
CVE-2015-1287
Severity:
Medium
Description:
Blink, as used in Google Chrome before 44.0.2403.89, enables a quirks-mode exception that limits the cases in which a Cascading Style Sheets (CSS) document is required to have the text/css content type, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to core/fetch/CSSStyleSheetResource.cpp.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7845
Title:
oval:org.cisecurity:def:7845: Vulnerability in Google Chrome before 41.0.2272.118
Type:
Web
Bulletins:
CISEC:7845
CVE-2015-1233
Severity:
High
Description:
Google Chrome before 41.0.2272.118 does not properly handle the interaction of IPC, the Gamepad API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7846
Title:
oval:org.cisecurity:def:7846: Cross-site scripting
Type:
Web
Bulletins:
CISEC:7846
CVE-2015-1264
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7847
Title:
oval:org.cisecurity:def:7847: Vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7847
CVE-2015-1284
Severity:
High
Description:
The LocalFrame::isURLAllowed function in core/frame/LocalFrame.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly check for a page's maximum number of frames, which allows remote attackers to cause a denial of service (invalid count value and use-after-free) or possibly have unspecified other impact via crafted JavaScript code that makes many createElement calls for IFRAME elements.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7848
Title:
oval:org.cisecurity:def:7848: Vulnerability in Google Chrome before 45.0.2454.85
Type:
Web
Bulletins:
CISEC:7848
CVE-2015-1298
Severity:
Medium
Description:
The RuntimeEventRouter::OnExtensionUninstalled function in extensions/browser/api/runtime/runtime_api.cc in Google Chrome before 45.0.2454.85 does not ensure that the setUninstallURL preference corresponds to the URL of a web site, which allows user-assisted remote attackers to trigger access to an arbitrary URL via a crafted extension that is uninstalled.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7849
Title:
oval:org.cisecurity:def:7849: Multiple use-after-free vulnerabilities in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7849
CVE-2015-1222
Severity:
High
Description:
Multiple use-after-free vulnerabilities in the ServiceWorkerScriptCacheMap implementation in content/browser/service_worker/service_worker_script_cache_map.cc in Google Chrome before 41.0.2272.76 allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a ServiceWorkerContextWrapper::DeleteAndStartOver call, related to the NotifyStartedCaching and NotifyFinishedCaching functions.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7850
Title:
oval:org.cisecurity:def:7850: Use-after-free vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7850
CVE-2015-1277
Severity:
High
Description:
Use-after-free vulnerability in the accessibility implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging lack of certain validity checks for accessibility-tree data structures.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7851
Title:
oval:org.cisecurity:def:7851: Use-after-free vulnerability in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7851
CVE-2015-1255
Severity:
Medium
Description:
Use-after-free vulnerability in content/renderer/media/webaudio_capturer_source.cc in the WebAudio implementation in Google Chrome before 43.0.2357.65 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging improper handling of a stop action for an audio track.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7852
Title:
oval:org.cisecurity:def:7852: Vulnerability in Blink, as used in Google Chrome before 45.0.2454.85
Type:
Web
Bulletins:
CISEC:7852
CVE-2015-1293
Severity:
High
Description:
The DOM implementation in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy via unspecified vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7853
Title:
oval:org.cisecurity:def:7853: Vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7853
CVE-2015-1224
Severity:
Medium
Description:
The VpxVideoDecoder::VpxDecode function in media/filters/vpx_video_decoder.cc in the vpxdecoder implementation in Google Chrome before 41.0.2272.76 does not ensure that alpha-plane dimensions are identical to image dimensions, which allows remote attackers to cause a denial of service (out-of-bounds read) via crafted VPx video data.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7854
Title:
oval:org.cisecurity:def:7854: Vulnerability in Google Chrome before 45.0.2454.85
Type:
Web
Bulletins:
CISEC:7854
CVE-2015-1292
Severity:
Medium
Description:
The NavigatorServiceWorker::serviceWorker function in modules/serviceworkers/NavigatorServiceWorker.cpp in Blink, as used in Google Chrome before 45.0.2454.85, allows remote attackers to bypass the Same Origin Policy by accessing a Service Worker.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7855
Title:
oval:org.cisecurity:def:7855: Vulnerability in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7855
CVE-2015-1263
Severity:
Medium
Description:
The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7856
Title:
oval:org.cisecurity:def:7856: Vulnerability index error in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7856
CVE-2015-1232
Severity:
High
Description:
Array index error in the MidiManagerUsb::DispatchSendMidiData function in media/midi/midi_manager_usb.cc in Google Chrome before 41.0.2272.76 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging renderer access to provide an invalid port index that triggers an out-of-bounds write operation, a different vulnerability than CVE-2015-1212.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7857
Title:
oval:org.cisecurity:def:7857: Cross-site scripting
Type:
Web
Bulletins:
CISEC:7857
CVE-2015-1286
Severity:
Medium
Description:
Cross-site scripting (XSS) vulnerability in the V8ContextNativeHandler::GetModuleSystem function in extensions/renderer/v8_context_native_handler.cc in Google Chrome before 44.0.2403.89 allows remote attackers to inject arbitrary web script or HTML by leveraging the lack of a certain V8 context restriction, aka a Blink "Universal XSS (UXSS)."
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7859
Title:
oval:org.cisecurity:def:7859: Vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7859
CVE-2015-1226
Severity:
Medium
Description:
The DebuggerFunction::InitAgentHost function in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 41.0.2272.76 does not properly restrict what URLs are available as debugger targets, which allows remote attackers to bypass intended access restrictions via a crafted extension.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7860
Title:
oval:org.cisecurity:def:7860: Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135
Type:
Web
Bulletins:
CISEC:7860
CVE-2015-1250
Severity:
High
Description:
Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7861
Title:
oval:org.cisecurity:def:7861: Vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7861
CVE-2015-1230
Severity:
High
Description:
The getHiddenProperty function in bindings/core/v8/V8EventListenerList.h in Blink, as used in Google Chrome before 41.0.2272.76, has a name conflict with the AudioContext class, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via JavaScript code that adds an AudioContext event listener and triggers "type confusion."
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7862
Title:
oval:org.cisecurity:def:7862: Double-free vulnerability in Google Chrome 41.0.2251.0
Type:
Web
Bulletins:
CISEC:7862
CVE-2015-1207
Severity:
Medium
Description:
Double-free vulnerability in libavformat/mov.c in FFMPEG in Google Chrome 41.0.2251.0 allows remote attackers to cause a denial of service (memory corruption and crash) via a crafted .m4a file.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7863
Title:
oval:org.cisecurity:def:7863: Vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7863
CVE-2015-1271
Severity:
Medium
Description:
PDFium, as used in Google Chrome before 44.0.2403.89, does not properly handle certain out-of-memory conditions, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted PDF document that triggers a large memory allocation.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7864
Title:
oval:org.cisecurity:def:7864: Vulnerability in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute
Type:
Web
Bulletins:
CISEC:7864
CVE-2015-1254
Severity:
Medium
Description:
core/dom/Document.cpp in Blink, as used in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute, which allows remote attackers to bypass the Same Origin Policy by leveraging the availability of editing.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7865
Title:
oval:org.cisecurity:def:7865: Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7865
CVE-2015-1231
Severity:
High
Description:
Multiple unspecified vulnerabilities in Google Chrome before 41.0.2272.76 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7866
Title:
oval:org.cisecurity:def:7866: Vulnerability in Google Chrome before 44.0.2403.89, mishandles converter names with initial x- substrings
Type:
Web
Bulletins:
CISEC:7866
CVE-2015-1270
Severity:
Medium
Description:
The ucnv_io_getConverterName function in common/ucnv_io.cpp in International Components for Unicode (ICU), as used in Google Chrome before 44.0.2403.89, mishandles converter names with initial x- substrings, which allows remote attackers to cause a denial of service (read of uninitialized memory) or possibly have unspecified other impact via a crafted file.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7867
Title:
oval:org.cisecurity:def:7867: Vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7867
CVE-2015-1288
Severity:
Medium
Description:
The Spellcheck API implementation in Google Chrome before 44.0.2403.89 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file, a related issue to CVE-2015-1263.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7868
Title:
oval:org.cisecurity:def:7868: Race condition in Google Chrome before 41.0.2272.118
Type:
Web
Bulletins:
CISEC:7868
CVE-2015-1234
Severity:
Medium
Description:
Race condition in gpu/command_buffer/service/gles2_cmd_decoder.cc in Google Chrome before 41.0.2272.118 allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact by manipulating OpenGL ES commands.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7869
Title:
oval:org.cisecurity:def:7869: Vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7869
CVE-2015-1285
Severity:
Medium
Description:
The XSSAuditor::canonicalize function in core/html/parser/XSSAuditor.cpp in the XSS auditor in Blink, as used in Google Chrome before 44.0.2403.89, does not properly choose a truncation point, which makes it easier for remote attackers to obtain sensitive information via an unspecified linear-time attack.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7870
Title:
oval:org.cisecurity:def:7870: Vulnerability in Google Chrome before 40.0.2214.91
Type:
Web
Bulletins:
CISEC:7870
CVE-2015-1248
Severity:
Medium
Description:
The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7871
Title:
oval:org.cisecurity:def:7871: Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7871
CVE-2015-1289
Severity:
High
Description:
Multiple unspecified vulnerabilities in Google Chrome before 44.0.2403.89 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7872
Title:
oval:org.cisecurity:def:7872: Vulnerability in Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value
Type:
Web
Bulletins:
CISEC:7872
CVE-2015-1258
Severity:
High
Description:
Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7873
Title:
oval:org.cisecurity:def:7873: Vulnerability in Blink, as used in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7873
CVE-2015-1235
Severity:
Medium
Description:
The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7874
Title:
oval:org.cisecurity:def:7874: Vulnerability in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7874
CVE-2015-1242
Severity:
High
Description:
The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages "type confusion" in the check-elimination optimization.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7875
Title:
oval:org.cisecurity:def:7875: Multiple use-after-free vulnerabilities in Google Chrome before 45.0.2454.85
Type:
Web
Bulletins:
CISEC:7875
CVE-2015-1295
Severity:
High
Description:
Multiple use-after-free vulnerabilities in the PrintWebViewHelper class in components/printing/renderer/print_web_view_helper.cc in Google Chrome before 45.0.2454.85 allow user-assisted remote attackers to cause a denial of service or possibly have unspecified other impact by triggering nested IPC messages during preparation for printing, as demonstrated by messages associated with PDF documents in conjunction with messages about printer capabilities.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7876
Title:
oval:org.cisecurity:def:7876: Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.91
Type:
Web
Bulletins:
CISEC:7876
CVE-2015-1205
Severity:
High
Description:
Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.91 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7877
Title:
oval:org.cisecurity:def:7877: Use-after-free vulnerability in Blink, as used in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7877
CVE-2015-1256
Severity:
High
Description:
Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that leverages improper handling of a shadow tree for a use element.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7884
Title:
oval:org.cisecurity:def:7884: Vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7884
CVE-2015-1229
Severity:
Medium
Description:
net/http/proxy_client_socket.cc in Google Chrome before 41.0.2272.76 does not properly handle a 407 (aka Proxy Authentication Required) HTTP status code accompanied by a Set-Cookie header, which allows remote proxy servers to conduct cookie-injection attacks via a crafted response.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7885
Title:
oval:org.cisecurity:def:7885: Vulnerability in Google Chrome before 43.0.2357.130
Type:
Web
Bulletins:
CISEC:7885
CVE-2015-1269
Severity:
Medium
Description:
The DecodeHSTSPreloadRaw function in net/http/transport_security_state.cc in Google Chrome before 43.0.2357.130 does not properly canonicalize DNS hostnames before making comparisons to HSTS or HPKP preload entries, which allows remote attackers to bypass intended access restrictions via a string that (1) ends in a . (dot) character or (2) is not entirely lowercase.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7886
Title:
oval:org.cisecurity:def:7886: Use-after-free vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7886
CVE-2015-1272
Severity:
High
Description:
Use-after-free vulnerability in the GPU process implementation in Google Chrome before 44.0.2403.89 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging the continued availability of a GPUChannelHost data structure during Blink shutdown, related to content/browser/gpu/browser_gpu_channel_host_factory.cc and content/renderer/render_thread_impl.cc.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7887
Title:
oval:org.cisecurity:def:7887: Memory corruption in V8 in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7887
CVE-2015-1290
Severity:
High
Description:
Memory corruption in V8 in Google Chrome before 44.0.2403.89.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7888
Title:
oval:org.cisecurity:def:7888: Integer overflow in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7888
CVE-2015-1219
Severity:
High
Description:
Integer overflow in the SkMallocPixelRef::NewAllocate function in core/SkMallocPixelRef.cpp in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted allocation of a large amount of memory during WebGL rendering.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7889
Title:
oval:org.cisecurity:def:7889: Vulnerability in Google Chrome before 40.0.2214.111
Type:
Web
Bulletins:
CISEC:7889
CVE-2015-1211
Severity:
High
Description:
The OriginCanAccessServiceWorkers function in content/browser/service_worker/service_worker_dispatcher_host.cc in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android does not properly restrict the URI scheme during a ServiceWorker registration, which allows remote attackers to gain privileges via a filesystem: URI.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7890
Title:
oval:org.cisecurity:def:7890: Vulnerability in Blink, as used initialize a certain width field
Type:
Web
Bulletins:
CISEC:7890
CVE-2015-1262
Severity:
High
Description:
platform/fonts/shaping/HarfBuzzShaper.cpp in Blink, as used in Google Chrome before 43.0.2357.65, does not initialize a certain width field, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Unicode text.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7891
Title:
oval:org.cisecurity:def:7891: Vulnerability in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7891
CVE-2015-1241
Severity:
Medium
Description:
Google Chrome before 42.0.2311.90 does not properly consider the interaction of page navigation with the handling of touch events and gesture events, which allows remote attackers to trigger unintended UI actions via a crafted web site that conducts a "tapjacking" attack.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7892
Title:
oval:org.cisecurity:def:7892: Vulnerability in Blink, as used in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7892
CVE-2015-1253
Severity:
High
Description:
core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7893
Title:
oval:org.cisecurity:def:7893: Use-after-free vulnerability in Blink, as used in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7893
CVE-2015-1216
Severity:
High
Description:
Use-after-free vulnerability in the V8Window::namedPropertyGetterCustom function in bindings/core/v8/custom/V8WindowCustom.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a frame detachment.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7894
Title:
oval:org.cisecurity:def:7894: Multiple use-after-free vulnerabilities in Blink, as used in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7894
CVE-2015-1223
Severity:
High
Description:
Multiple use-after-free vulnerabilities in core/html/HTMLInputElement.cpp in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger extraneous change events, as demonstrated by events for invalid input or input to read-only fields, related to the initializeTypeInParsing and updateType functions.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7895
Title:
oval:org.cisecurity:def:7895: Multiple use-after-free vulnerabilities in Blink, as used in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7895
CVE-2015-1218
Severity:
High
Description:
Multiple use-after-free vulnerabilities in the DOM implementation in Blink, as used in Google Chrome before 41.0.2272.76, allow remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger movement of a SCRIPT element to different documents, related to (1) the HTMLScriptElement::didMoveToNewDocument function in core/html/HTMLScriptElement.cpp and (2) the SVGScriptElement::didMoveToNewDocument function in core/svg/SVGScriptElement.cpp.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7896
Title:
oval:org.cisecurity:def:7896: Vulnerability in Skia, as used in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7896
CVE-2015-1213
Severity:
High
Description:
The SkBitmap::ReadRawPixels function in core/SkBitmap.cpp in the filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7897
Title:
oval:org.cisecurity:def:7897: Vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7897
CVE-2015-1228
Severity:
High
Description:
The RenderCounter::updateCounter function in core/rendering/RenderCounter.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not force a relayout operation and consequently does not initialize memory for a data structure, which allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted Cascading Style Sheets (CSS) token sequence.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7898
Title:
oval:org.cisecurity:def:7898: Vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7898
CVE-2015-1281
Severity:
Medium
Description:
core/loader/ImageLoader.cpp in Blink, as used in Google Chrome before 44.0.2403.89, does not properly determine the V8 context of a microtask, which allows remote attackers to bypass Content Security Policy (CSP) restrictions by providing an image from an unintended source.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7899
Title:
oval:org.cisecurity:def:7899: Multiple use-after-free vulnerabilities in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7899
CVE-2015-1282
Severity:
Medium
Description:
Multiple use-after-free vulnerabilities in fpdfsdk/src/javascript/Document.cpp in PDFium, as used in Google Chrome before 44.0.2403.89, allow remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted PDF document, related to the (1) Document::delay and (2) Document::DoFieldDelay functions.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7900
Title:
oval:org.cisecurity:def:7900: Use-after-free vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7900
CVE-2015-1245
Severity:
Medium
Description:
Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium "Open PDF in Reader" button that has an invalid tab association.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7901
Title:
oval:org.cisecurity:def:7901: Vulnerability in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7901
CVE-2015-1259
Severity:
High
Description:
PDFium, as used in Google Chrome before 43.0.2357.65, does not properly initialize memory, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7902
Title:
oval:org.cisecurity:def:7902: Vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7902
CVE-2015-1225
Severity:
Medium
Description:
PDFium, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7812
Title:
oval:org.cisecurity:def:7812: Vulnerability in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7812
CVE-2015-1238
Severity:
High
Description:
Skia, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7813
Title:
oval:org.cisecurity:def:7813: Vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7813
CVE-2015-1227
Severity:
High
Description:
The DragImage::create function in platform/DragImage.cpp in Blink, as used in Google Chrome before 41.0.2272.76, does not initialize memory for image drawing, which allows remote attackers to have an unspecified impact by triggering a failed image decoding, as demonstrated by an image for which the default orientation cannot be used.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7821
Title:
oval:org.cisecurity:def:7821: Vulnerability in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7821
CVE-2015-1252
Severity:
High
Description:
common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a write operation with a large amount of data, related to the PartialCircularBuffer::Write and PartialCircularBuffer::DoWrite functions.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7822
Title:
oval:org.cisecurity:def:7822: Vulnerability in Google Chrome before 45.0.2454.85
Type:
Web
Bulletins:
CISEC:7822
CVE-2015-1297
Severity:
High
Description:
The WebRequest API implementation in extensions/browser/api/web_request/web_request_api.cc in Google Chrome before 45.0.2454.85 does not properly consider a request's source before accepting the request, which allows remote attackers to bypass intended access restrictions via a crafted (1) app or (2) extension.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7823
Title:
oval:org.cisecurity:def:7823: Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111
Type:
Web
Bulletins:
CISEC:7823
CVE-2015-1212
Severity:
High
Description:
Multiple unspecified vulnerabilities in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android allow attackers to cause a denial of service or possibly have other impact via unknown vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7824
Title:
oval:org.cisecurity:def:7824: Vulnerability in Google Chrome before 43.0.2357.130
Type:
Web
Bulletins:
CISEC:7824
CVE-2015-1267
Severity:
Medium
Description:
Blink, as used in Google Chrome before 43.0.2357.130, does not properly restrict the creation context during creation of a DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that uses a Blink public API, related to WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, and WebDOMFileSystem.cpp.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7825
Title:
oval:org.cisecurity:def:7825: Vulnerability in Skia, as used in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7825
CVE-2015-1215
Severity:
High
Description:
The filters implementation in Skia, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an out-of-bounds write operation.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7826
Title:
oval:org.cisecurity:def:7826: Vulnerability in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7826
CVE-2015-1240
Severity:
Medium
Description:
gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7827
Title:
oval:org.cisecurity:def:7827: Multiple use-after-free vulnerabilities in Google Chrome before 43.0.2357.65
Type:
Web
Bulletins:
CISEC:7827
CVE-2015-1260
Severity:
High
Description:
Multiple use-after-free vulnerabilities in content/renderer/media/user_media_client_impl.cc in the WebRTC implementation in Google Chrome before 43.0.2357.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that executes upon completion of a getUserMedia request.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7814
Title:
oval:org.cisecurity:def:7814: Multiple integer overflows in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products
Type:
Web
Bulletins:
CISEC:7814
CVE-2015-1283
Severity:
Medium
Description:
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7815
Title:
oval:org.cisecurity:def:7815: Use-after-free vulnerability in Blink, as used in Google Chrome before 40.0.2214.111
Type:
Web
Bulletins:
CISEC:7815
CVE-2015-1209
Severity:
High
Description:
Use-after-free vulnerability in the VisibleSelection::nonBoundaryShadowTreeRootNode function in core/editing/VisibleSelection.cpp in the DOM implementation in Blink, as used in Google Chrome before 40.0.2214.111 on Windows, OS X, and Linux and before 40.0.2214.109 on Android, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that triggers improper handling of a shadow-root anchor.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7816
Title:
oval:org.cisecurity:def:7816: Use-after-free vulnerability in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7816
CVE-2015-1237
Severity:
High
Description:
Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7817
Title:
oval:org.cisecurity:def:7817: Vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7817
CVE-2015-1217
Severity:
High
Description:
The V8LazyEventListener::prepareListenerObject function in bindings/core/v8/V8LazyEventListener.cpp in the V8 bindings in Blink, as used in Google Chrome before 41.0.2272.76, does not properly compile listeners, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage "type confusion."
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7818
Title:
oval:org.cisecurity:def:7818: Vulnerability in Google Chrome before 42.0.2311.90
Type:
Web
Bulletins:
CISEC:7818
CVE-2015-1246
Severity:
Medium
Description:
Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7819
Title:
oval:org.cisecurity:def:7819: Vulnerability in Google Chrome before 44.0.2403.89
Type:
Web
Bulletins:
CISEC:7819
CVE-2015-1274
Severity:
Medium
Description:
Google Chrome before 44.0.2403.89 does not ensure that the auto-open list omits all dangerous file types, which makes it easier for remote attackers to execute arbitrary code by providing a crafted file and leveraging a user's previous "Always open files of this type" choice, related to download_commands.cc and download_prefs.cc.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7820
Title:
oval:org.cisecurity:def:7820: Use-after-free vulnerability in Google Chrome before 41.0.2272.76
Type:
Web
Bulletins:
CISEC:7820
CVE-2015-1221
Severity:
High
Description:
Use-after-free vulnerability in Blink, as used in Google Chrome before 41.0.2272.76, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect ordering of operations in the Web SQL Database thread relative to Blink's main thread, related to the shutdown function in web/WebKit.cpp.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7828
Title:
oval:org.cisecurity:def:7828: Use-after-free vulnerability in Blink, as used in Google Chrome before 42.0.2311.135
Type:
Web
Bulletins:
CISEC:7828
CVE-2015-1243
Severity:
High
Description:
Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7829
Title:
oval:org.cisecurity:def:7829: Vulnerability in Google Chrome before 43.0.2357.130
Type:
Web
Bulletins:
CISEC:7829
CVE-2015-1268
Severity:
Medium
Description:
bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.
Applies to:
Google Chrome
Created:
2020-07-17
Updated:
2020-07-17

ID:
CISEC:7714
Title:
oval:org.cisecurity:def:7714: Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7714
CVE-2020-0916
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how GDI handles objects in memory and by preventing instances of unintended user-mode privilege elevation.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7715
Title:
oval:org.cisecurity:def:7715: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7715
CVE-2020-1265
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7716
Title:
oval:org.cisecurity:def:7716: Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7716
CVE-2020-1255
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content. An attacker who successfully exploited this vulnerability could upload restricted file types to an IIS-hosted folder. To exploit this vulnerability, an attacker would require permissions to upload files via BITS. An attacker could then submit a specially crafted request to upload a file. The security update addresses the vulnerability by correcting how Windows BITS validates file names.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7717
Title:
oval:org.cisecurity:def:7717: Windows OLE Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7717
CVE-2020-1281
Severity:
Low
Description:
A remote code execution vulnerability exists when Microsoft Windows OLE fails to properly validate user input. An attacker could exploit the vulnerability to execute malicious code. To exploit the vulnerability, an attacker would have to convince a user to open either a specially crafted file or a program from either a webpage or an email message. The update addresses the vulnerability by correcting how Windows OLE validates user input.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7718
Title:
oval:org.cisecurity:def:7718: Windows SMBv3 Client/Server Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7718
CVE-2020-1206
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 server. To exploit the vulnerability against a client, an unauthenticated attacker would need to configure a malicious SMBv3 server and convince a user to connect to it. The security update addresses the vulnerability by correcting how the SMBv3 protocol handles these specially crafted requests.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7719
Title:
oval:org.cisecurity:def:7719: Windows WalletService Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7719
CVE-2020-1294
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7720
Title:
oval:org.cisecurity:def:7720: Windows Mobile Device Management Diagnostics Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7720
CVE-2020-1204
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Mobile Device Management (MDM) Diagnostics improperly handles junctions. An attacker who successfully exploited this vulnerability could bypass access restrictions to delete files. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and remove files. The security update addresses the vulnerability by correcting the how Windows MDM Diagnostics handles files.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7721
Title:
oval:org.cisecurity:def:7721: DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7721
CVE-2020-1258
Severity:
Low
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7722
Title:
oval:org.cisecurity:def:7722: Windows Kernel Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:7722
CVE-2020-1241
Severity:
Low
Description:
A security feature bypass vulnerability exists when Windows Kernel fails to properly sanitize certain parameters. To exploit the vulnerability, a locally-authenticated attacker could attempt to run a specially crafted application on a targeted system. The update addresses the vulnerability by correcting how Windows Kernel handles parameter sanitization.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7723
Title:
oval:org.cisecurity:def:7723: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7723
CVE-2020-1269
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7724
Title:
oval:org.cisecurity:def:7724: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7724
CVE-2020-1264
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7725
Title:
oval:org.cisecurity:def:7725: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7725
CVE-2020-1246
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7726
Title:
oval:org.cisecurity:def:7726: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7726
CVE-2020-1237
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7727
Title:
oval:org.cisecurity:def:7727: Windows SMB Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7727
CVE-2020-1301
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 1.0 (SMBv1) server handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server. To exploit the vulnerability, in most situations, an authenticated attacker could send a specially crafted packet to a targeted SMBv1 server. The security update addresses the vulnerability by correcting how SMBv1 handles these specially crafted requests.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7728
Title:
oval:org.cisecurity:def:7728: Windows Network Connections Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7728
CVE-2020-1291
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Network Connections Service properly handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7730
Title:
oval:org.cisecurity:def:7730: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7730
CVE-2020-1273
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7731
Title:
oval:org.cisecurity:def:7731: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7731
CVE-2020-1304
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7732
Title:
oval:org.cisecurity:def:7732: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7732
CVE-2020-1247
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7733
Title:
oval:org.cisecurity:def:7733: GDI+ Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7733
CVE-2020-1248
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. There are multiple ways an attacker could exploit the vulnerability: In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to open an email attachment or click a link in an email or instant message. In a file-sharing attack scenario, an attacker could provide a specially crafted document file that is designed to exploit the vulnerability, and then convince users to open the document file. The security update addresses the vulnerability by correcting the way that the Windows GDI handles objects in the memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7734
Title:
oval:org.cisecurity:def:7734: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7734
CVE-2020-1274
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7735
Title:
oval:org.cisecurity:def:7735: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7735
CVE-2020-0986
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7736
Title:
oval:org.cisecurity:def:7736: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7736
CVE-2020-1276
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7737
Title:
oval:org.cisecurity:def:7737: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7737
CVE-2020-1310
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7738
Title:
oval:org.cisecurity:def:7738: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7738
CVE-2020-1282
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7739
Title:
oval:org.cisecurity:def:7739: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7739
CVE-2020-1251
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7729
Title:
oval:org.cisecurity:def:7729: LNK Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7729
CVE-2020-1299
Severity:
Low
Description:
A remote code execution vulnerability exists in Microsoft Windows that could allow remote code execution if a .LNK file is processed. An attacker who successfully exploited this vulnerability could gain the same user rights as the local user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. The attacker could present to the user a removable drive, or remote share, that contains a malicious .LNK file and an associated malicious binary. When the user opens this drive(or remote share) in Windows Explorer, or any other application that parses the .LNK file, the malicious binary will execute code of the attacker’s choice, on the target system. The security update addresses the vulnerability by correcting the processing of shortcut LNK references.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7740
Title:
oval:org.cisecurity:def:7740: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7740
CVE-2020-1253
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7741
Title:
oval:org.cisecurity:def:7741: Windows Diagnostics & feedback Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7741
CVE-2020-1296
Severity:
Low
Description:
A vulnerability exists in the way the Windows Diagnostics & feedback settings app handles objects in memory. An attacker who successfully exploited this vulnerability could cause additional diagnostic data from the affected device to be sent to Microsoft. To exploit the vulnerability, an attacker would have to log on to an affected system and interact with the Windows Diagnostics & feedback Settings app. The security update addresses the vulnerability by correcting the way the Windows Diagnostics & feedback Settings app handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7742
Title:
oval:org.cisecurity:def:7742: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7742
CVE-2020-1266
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7743
Title:
oval:org.cisecurity:def:7743: Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7743
CVE-2020-1290
Severity:
Low
Description:
An information disclosure vulnerability exists when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how win32k handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7744
Title:
oval:org.cisecurity:def:7744: Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7744
CVE-2020-0915
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how GDI handles objects in memory and by preventing instances of unintended user-mode privilege elevation.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7745
Title:
oval:org.cisecurity:def:7745: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7745
CVE-2020-1236
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7746
Title:
oval:org.cisecurity:def:7746: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7746
CVE-2020-1231
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7747
Title:
oval:org.cisecurity:def:7747: Windows Feedback Hub Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7747
CVE-2020-1199
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Feedback Hub improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit this vulnerability, an attacker would first have to log on to the system with Windows Mixed Reality installed. An attacker could then run a specially crafted application to take control of an affected system. The security update addresses the vulnerability by correcting how the Feedback Hub handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7748
Title:
oval:org.cisecurity:def:7748: Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7748
CVE-2020-1277
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations. To exploit the vulnerability, an attacker would require unprivileged execution on the victim system. After successfully exploiting the vulnerability, an attacker could run arbitrary code with elevated privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting the way Windows Installer handles certain filesystem operations.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7749
Title:
oval:org.cisecurity:def:7749: OpenSSH for Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7749
CVE-2020-1292
Severity:
Low
Description:
An elevation of privilege vulnerability exists in OpenSSH for Windows when it does not properly restrict access to configuration settings. An attacker who successfully exploited this vulnerability could replace the shell with a malicious binary. To exploit this vulnerability, an authenticated attacker would need to modify the OpenSSH for Windows configuration on a vulnerable system. The attacker would then need to convince a user to connect to the vulnerable OpenSSH for Windows server. The update addresses the vulnerability by restricting access to OpenSSH for Windows configuration settings.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7750
Title:
oval:org.cisecurity:def:7750: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7750
CVE-2020-1306
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7751
Title:
oval:org.cisecurity:def:7751: Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7751
CVE-2020-1312
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations. To exploit the vulnerability, an attacker would require unprivileged execution on the victim system. After successfully exploiting the vulnerability, an attacker could run arbitrary code with elevated privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting the way Windows Installer handles certain filesystem operations.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7752
Title:
oval:org.cisecurity:def:7752: Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7752
CVE-2020-1300
Severity:
Low
Description:
A remote code execution vulnerability exists when Microsoft Windows fails to properly handle cabinet files. To exploit the vulnerability, an attacker would have to convince a user to either open a specially crafted cabinet file or spoof a network printer and trick a user into installing a malicious cabinet file disguised as a printer driver. The update addresses the vulnerability by correcting how Windows handles cabinet files.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7753
Title:
oval:org.cisecurity:def:7753: Windows Backup Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7753
CVE-2020-1271
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Backup Service handles file operations.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7754
Title:
oval:org.cisecurity:def:7754: Group Policy Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7754
CVE-2020-1317
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Group Policy improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how Group Policy checks access.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7755
Title:
oval:org.cisecurity:def:7755: Media Foundation Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7755
CVE-2020-1232
Severity:
Low
Description:
An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log onto an affected system and open a specially crafted file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The update addresses the vulnerability by correcting how Media Foundation handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7756
Title:
oval:org.cisecurity:def:7756: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7756
CVE-2020-1324
Severity:
Low
Description:
An elevation of privilege (user to user) vulnerability exists in Windows Security Health Service when handling certain objects in memory. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted command that could exploit the vulnerability to elevate privileges. The update addresses the vulnerability by correcting how Windows Security Health Service handles certain objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7757
Title:
oval:org.cisecurity:def:7757: Windows Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7757
CVE-2020-1268
Severity:
Low
Description:
An information disclosure vulnerability exists when a Windows service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how a Windows service handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7758
Title:
oval:org.cisecurity:def:7758: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7758
CVE-2020-1235
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7759
Title:
oval:org.cisecurity:def:7759: Windows Error Reporting Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7759
CVE-2020-1263
Severity:
Low
Description:
An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or convince a target to run a crafted application. The security update addresses the vulnerability by correcting the way WER handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7760
Title:
oval:org.cisecurity:def:7760: Windows Registry Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7760
CVE-2020-1194
Severity:
Low
Description:
A denial of service vulnerability exists when Windows Registry improperly handles filesystem operations. An attacker who successfully exploited the vulnerability could cause a denial of service against a system. To exploit the vulnerability, an attacker who has access to the system could run a specially crafted application. The security update addresses the vulnerability by correcting how Windows Registry handles filesystem operations and only allowing the tracing to be captured under the default path.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7761
Title:
oval:org.cisecurity:def:7761: Component Object Model Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7761
CVE-2020-1311
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Component Object Model (COM) client uses special case IIDs. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how COM handles special case IIDs, to help preclude unintended elevated system privileges.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7762
Title:
oval:org.cisecurity:def:7762: Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7762
CVE-2020-1272
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting the input sanitization error to preclude unintended elevation.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7763
Title:
oval:org.cisecurity:def:7763: Windows Runtime Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7763
CVE-2020-1217
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could read memory that was freed and might run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7764
Title:
oval:org.cisecurity:def:7764: Windows Lockscreen Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7764
CVE-2020-1279
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Lockscreen fails to properly load spotlight images from a secure location. An attacker who successfully exploited the vulnerability could execute commands with elevated permissions. An authenticated attacker could modify a registry value to exploit this vulnerability. The security update addresses the vulnerability by ensuring that the spotlight images are always loaded from a secure location.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7765
Title:
oval:org.cisecurity:def:7765: Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7765
CVE-2020-1283
Severity:
Low
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or to convince a user to open a specific file on a network share. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7766
Title:
oval:org.cisecurity:def:7766: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7766
CVE-2020-1305
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7767
Title:
oval:org.cisecurity:def:7767: Windows Bluetooth Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7767
CVE-2020-1280
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Bluetooth Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Bluetooth Service properly handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7768
Title:
oval:org.cisecurity:def:7768: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7768
CVE-2020-1208
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7769
Title:
oval:org.cisecurity:def:7769: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7769
CVE-2020-1316
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7770
Title:
oval:org.cisecurity:def:7770: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7770
CVE-2020-1207
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7771
Title:
oval:org.cisecurity:def:7771: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7771
CVE-2020-1238
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7772
Title:
oval:org.cisecurity:def:7772: OLE Automation Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7772
CVE-2020-1212
Severity:
Low
Description:
An elevation of privilege vulnerability exists when an OLE Automation component improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how an OLE Automation component handles memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7773
Title:
oval:org.cisecurity:def:7773: Windows Error Reporting Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7773
CVE-2020-1234
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Error Reporting improperly handles objects in memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Windows Error Reporting handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7774
Title:
oval:org.cisecurity:def:7774: Windows Network List Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7774
CVE-2020-1209
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Network List Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Network List Service properly handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7775
Title:
oval:org.cisecurity:def:7775: Windows Error Reporting Manager Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7775
CVE-2020-1197
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles a process crash. An attacker who successfully exploited this vulnerability could delete a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows Error Reporting manager handles process crashes.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7776
Title:
oval:org.cisecurity:def:7776: Windows Update Orchestrator Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7776
CVE-2020-1313
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Update Orchestrator Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Update Orchestrator Service handles file operations.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7777
Title:
oval:org.cisecurity:def:7777: Windows Text Service Framework Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7777
CVE-2020-1314
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Text Service Framework (TSF) when the TSF server fails to properly handle messages sent from TSF clients. An attacker who successfully exploited this vulnerability could run arbitrary code in a privileged process. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how TSF server handles messages in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7778
Title:
oval:org.cisecurity:def:7778: Windows Shell Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7778
CVE-2020-1286
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Shell does not properly validate file paths. An attacker who successfully exploited this vulnerability could run arbitrary code in the context of the current user. If the current user is logged on as an administrator, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with elevated privileges. Users whose accounts are configured to have fewer privileges on the system could be less impacted than users who operate with administrative privileges. To exploit the vulnerability, an attacker must entice a user to open a specially crafted file. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and then convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force a user to visit the website. Instead, an attacker would have to convince a user to click a link and open the specially crafted file. This security update addresses the vulnerability by ensuring the Windows Shell properly validates file paths.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7779
Title:
oval:org.cisecurity:def:7779: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7779
CVE-2020-1334
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7780
Title:
oval:org.cisecurity:def:7780: Windows Modules Installer Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7780
CVE-2020-1254
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Modules Installer Service improperly handles class object members. A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The update addresses the vulnerability by correcting how Windows handles calls to preclude unintended elevation.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7781
Title:
oval:org.cisecurity:def:7781: Microsoft Store Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7781
CVE-2020-1222
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Microsoft Store Runtime handles memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7782
Title:
oval:org.cisecurity:def:7782: Windows WalletService Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7782
CVE-2020-1287
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows WalletService handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows WalletService properly handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7783
Title:
oval:org.cisecurity:def:7783: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7783
CVE-2020-1239
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7784
Title:
oval:org.cisecurity:def:7784: Connected User Experiences and Telemetry Service Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7784
CVE-2020-1244
Severity:
Low
Description:
A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could cause a system to stop responding. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability. The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service handles file operations.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7785
Title:
oval:org.cisecurity:def:7785: Windows WLAN Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7785
CVE-2020-1270
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the wlansvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the wlansvc.dll properly handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7786
Title:
oval:org.cisecurity:def:7786: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7786
CVE-2020-1348
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7787
Title:
oval:org.cisecurity:def:7787: Windows Now Playing Session Manager Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7787
CVE-2020-1201
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way the Windows Now Playing Session Manager handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how the Windows Now Playing Session Manager handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7788
Title:
oval:org.cisecurity:def:7788: Connected Devices Platform Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7788
CVE-2020-1211
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Connected Devices Platform Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Connected Devices Platform Service properly handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7789
Title:
oval:org.cisecurity:def:7789: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7789
CVE-2020-1262
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7790
Title:
oval:org.cisecurity:def:7790: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7790
CVE-2020-1275
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7791
Title:
oval:org.cisecurity:def:7791: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7791
CVE-2020-1307
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7792
Title:
oval:org.cisecurity:def:7792: Windows Error Reporting Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7792
CVE-2020-1261
Severity:
Low
Description:
An information disclosure vulnerability exists in the way Windows Error Reporting (WER) handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit the vulnerability, an attacker would have to log on to an affected system and run a specially crafted application or convince a target to run a crafted application. The security update addresses the vulnerability by correcting the way WER handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7793
Title:
oval:org.cisecurity:def:7793: Windows Host Guardian Service Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:7793
CVE-2020-1259
Severity:
Low
Description:
A security feature bypass vulnerability exists when Windows Host Guardian Service improperly handles hashes recorded and logged. An attacker who successfully exploited the vulnerability could tamper with the log file. In an attack scenario, an attacker can change existing event log types to a type the parsers do not interpret allowing an attacker to append their own hash without triggering an alert. The update addresses the vulnerability by correcting how Windows Host Guardian Service handles logging of the measured boot hash.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7794
Title:
oval:org.cisecurity:def:7794: Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7794
CVE-2020-1160
Severity:
Low
Description:
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7795
Title:
oval:org.cisecurity:def:7795: Windows Print Configuration Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7795
CVE-2020-1196
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the printconfig.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the printconfig.dll properly handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7796
Title:
oval:org.cisecurity:def:7796: Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7796
CVE-2020-1302
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations. To exploit the vulnerability, an attacker would require unprivileged execution on the victim system. After successfully exploiting the vulnerability, an attacker could run arbitrary code with elevated privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting the way Windows Installer handles certain filesystem operations.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7797
Title:
oval:org.cisecurity:def:7797: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7797
CVE-2020-1233
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7798
Title:
oval:org.cisecurity:def:7798: Microsoft Store Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7798
CVE-2020-1309
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Microsoft Store Runtime improperly handles memory. To exploit this vulnerability, an attacker would first have to gain execution on the victim system. An attacker could then run a specially crafted application to elevate privileges. The security update addresses the vulnerability by correcting how the Microsoft Store Runtime handles memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7799
Title:
oval:org.cisecurity:def:7799: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7799
CVE-2020-1162
Severity:
Low
Description:
An elevation of privilege (user to user) vulnerability exists in Windows Security Health Service when handling certain objects in memory. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted command that could exploit the vulnerability to elevate privileges. The update addresses the vulnerability by correcting how Windows Security Health Service handles certain objects in memory.
Applies to:
Created:
2020-07-10
Updated:
2020-08-13

ID:
CISEC:7653
Title:
oval:org.cisecurity:def:7653: Microsoft Office Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7653
Severity:
Low
Description:
A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0991.
Applies to:
Microsoft Access 2010
Microsoft Access 2013
Microsoft Access 2016
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Created:
2020-07-03
Updated:
2020-07-03

ID:
CISEC:7663
Title:
oval:org.cisecurity:def:7663: Vulnerability in Acronis True Image up to and including version 2017 Build 8053
Type:
Software
Bulletins:
CISEC:7663
CVE-2017-3219
Severity:
High
Description:
Acronis True Image up to and including version 2017 Build 8053 performs software updates using HTTP. Downloaded updates are only verified using a server-provided MD5 hash.
Applies to:
Acronis True Image
Created:
2020-07-03
Updated:
2020-07-03

ID:
CISEC:7666
Title:
oval:org.cisecurity:def:7666: Untrusted search path vulnerability in Amazon Kindle before 1.19
Type:
Software
Bulletins:
CISEC:7666
CVE-2017-6189
Severity:
Medium
Description:
Untrusted search path vulnerability in Amazon Kindle for PC before 1.19 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse DLL in the current working directory of the Kindle Setup installer.
Applies to:
Amazon Kindle
Created:
2020-07-03
Updated:
2020-07-03

ID:
CISEC:7545
Title:
oval:org.cisecurity:def:7545: Connected User Experiences and Telemetry Service Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7545
CVE-2020-1084
Severity:
Low
Description:
A Denial Of Service vulnerability exists when Connected User Experiences and Telemetry Service fails to validate certain function values. An attacker who successfully exploited this vulnerability could deny dependent security feature functionality. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service validates certain function values.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7546
Title:
oval:org.cisecurity:def:7546: Windows Print Spooler Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7546
CVE-2020-1070
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7547
Title:
oval:org.cisecurity:def:7547: Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7547
CVE-2020-1010
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Block Level Backup Engine Service (wbengine) that allows file deletion in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how the Windows Block Level Backup Engine Service handles file operations.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7548
Title:
oval:org.cisecurity:def:7548: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7548
CVE-2020-0963
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7549
Title:
oval:org.cisecurity:def:7549: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7549
CVE-2020-1145
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how GDI handles memory addresses.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7550
Title:
oval:org.cisecurity:def:7550: Windows Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7550
CVE-2020-1067
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code with elevated permissions on a target system. To exploit the vulnerability, an attacker who has a domain user account could create a specially crafted request, causing Windows to execute arbitrary code with elevated permissions. The security update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7551
Title:
oval:org.cisecurity:def:7551: Windows Push Notification Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7551
CVE-2020-1137
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way the Windows Push Notification Service handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could then install programs; view, change or delete data. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how the Windows Push Notification Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7552
Title:
oval:org.cisecurity:def:7552: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7552
CVE-2020-1149
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7553
Title:
oval:org.cisecurity:def:7553: Windows Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7553
CVE-2020-1076
Severity:
Low
Description:
A denial of service vulnerability exists when Windows improperly handles objects in memory. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to cause a target system to stop responding. The update addresses the vulnerability by correcting how Windows handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7554
Title:
oval:org.cisecurity:def:7554: Windows Graphics Component Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7554
CVE-2020-1135
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. In a local attack scenario, an attacker could exploit this vulnerability by running a specially crafted application to take control over the affected system. The update addresses the vulnerability by correcting the way in which the Microsoft Graphics Component handles objects in memory and preventing unintended elevation from user mode.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7555
Title:
oval:org.cisecurity:def:7555: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7555
CVE-2020-1139
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7556
Title:
oval:org.cisecurity:def:7556: Windows Clipboard Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7556
CVE-2020-1111
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Clipboard Service. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to Clipboard Service.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7557
Title:
oval:org.cisecurity:def:7557: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7557
CVE-2020-1126
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7558
Title:
oval:org.cisecurity:def:7558: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7558
CVE-2020-1185
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7559
Title:
oval:org.cisecurity:def:7559: Windows Clipboard Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7559
CVE-2020-1166
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Clipboard Service. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to Clipboard Service.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7560
Title:
oval:org.cisecurity:def:7560: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7560
CVE-2020-1158
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7561
Title:
oval:org.cisecurity:def:7561: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7561
CVE-2020-1077
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7562
Title:
oval:org.cisecurity:def:7562: Windows Error Reporting Manager Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7562
CVE-2020-1132
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows Error Reporting manager improperly handles file and folder links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The security update addresses the vulnerability by correcting how Windows Error Reporting manager handles file and folder links.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7563
Title:
oval:org.cisecurity:def:7563: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7563
CVE-2020-1176
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7564
Title:
oval:org.cisecurity:def:7564: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7564
CVE-2020-1190
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7565
Title:
oval:org.cisecurity:def:7565: Windows Clipboard Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7565
CVE-2020-1121
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Clipboard Service. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to Clipboard Service.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7566
Title:
oval:org.cisecurity:def:7566: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7566
CVE-2020-1174
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7567
Title:
oval:org.cisecurity:def:7567: Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7567
CVE-2020-1079
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7568
Title:
oval:org.cisecurity:def:7568: Windows Clipboard Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7568
CVE-2020-1165
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles calls to Clipboard Service. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control over an affected system. The update addresses the vulnerability by correcting how Windows handles calls to Clipboard Service.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7569
Title:
oval:org.cisecurity:def:7569: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7569
CVE-2020-1090
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7570
Title:
oval:org.cisecurity:def:7570: Windows GDI Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7570
CVE-2020-1142
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how GDI handles objects in memory and by preventing instances of unintended user-mode privilege elevation.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7571
Title:
oval:org.cisecurity:def:7571: Windows Common Log File System Driver Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7571
CVE-2020-1154
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. To exploit the vulnerability, an attacker would first have to log on to the system, and then run a specially crafted application to take control over the affected system. The security update addresses the vulnerability by correcting how CLFS handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7572
Title:
oval:org.cisecurity:def:7572: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7572
CVE-2020-1150
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7573
Title:
oval:org.cisecurity:def:7573: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7573
CVE-2020-1087
Severity:
Low
Description:
An elevation of privilege vulnerability exists in the way that the Windows Kernel handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the Windows Kernel properly handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7574
Title:
oval:org.cisecurity:def:7574: Windows Installer Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7574
CVE-2020-1078
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Installer because of the way Windows Installer handles certain filesystem operations. To exploit the vulnerability, an attacker would require unprivileged execution on the victim system. After successfully exploiting the vulnerability, an attacker could run arbitrary code with elevated privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting the way Windows Installer handles certain filesystem operations.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7575
Title:
oval:org.cisecurity:def:7575: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7575
CVE-2020-1051
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7576
Title:
oval:org.cisecurity:def:7576: Windows Update Stack Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7576
CVE-2020-1109
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows Update Stack handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7577
Title:
oval:org.cisecurity:def:7577: Microsoft Active Directory Federation Services Cross-Site Scripting Vulnerability
Type:
Software
Bulletins:
CISEC:7577
CVE-2020-1055
Severity:
Low
Description:
A cross-site-scripting (XSS) vulnerability exists when Active Directory Federation Services (ADFS) does not properly sanitize user inputs. An un-authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected ADFS server. The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run scripts in the security context of the current user. This security update addresses the vulnerability by ensuring that ADFS properly sanitizes user inputs.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7578
Title:
oval:org.cisecurity:def:7578: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7578
CVE-2020-1155
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7579
Title:
oval:org.cisecurity:def:7579: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7579
CVE-2020-1072
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7580
Title:
oval:org.cisecurity:def:7580: Microsoft Windows Transport Layer Security Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7580
CVE-2020-1118
Severity:
Low
Description:
A denial of service vulnerability exists in the Windows implementation of Transport Layer Security (TLS) when it improperly handles certain key exchanges. An attacker who successfully exploited the vulnerability could cause a target system to stop responding. To exploit this vulnerability, a remote unauthenticated attacker could send a specially crafted request to a target system utilizing TLS 1.2 or lower, triggering the system to automatically reboot. The update addresses the vulnerability by changing the way TLS key exchange messages are validated.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7581
Title:
oval:org.cisecurity:def:7581: Microsoft Script Runtime Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7581
CVE-2020-1061
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Microsoft Script Runtime handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website. An attacker could also embed an ActiveX control marked "safe for initialization" in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability. The security update addresses the vulnerability by modifying how the Microsoft Script Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7582
Title:
oval:org.cisecurity:def:7582: Microsoft Graphics Components Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7582
CVE-2020-1153
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7583
Title:
oval:org.cisecurity:def:7583: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7583
CVE-2020-1028
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7584
Title:
oval:org.cisecurity:def:7584: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7584
CVE-2020-1189
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7585
Title:
oval:org.cisecurity:def:7585: Windows Update Stack Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7585
CVE-2020-1110
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Update Stack fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows Update Stack handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7586
Title:
oval:org.cisecurity:def:7586: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7586
CVE-2020-1175
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7587
Title:
oval:org.cisecurity:def:7587: Windows Error Reporting Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7587
CVE-2020-1082
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it. An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functionality. To exploit the vulnerability, an attacker could run a specially crafted application. The security update addresses the vulnerability by correcting the way that WER handles and executes files.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7588
Title:
oval:org.cisecurity:def:7588: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7588
CVE-2020-1141
Severity:
Low
Description:
An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The security update addresses the vulnerability by correcting how GDI handles memory addresses.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7589
Title:
oval:org.cisecurity:def:7589: Windows Error Reporting Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7589
CVE-2020-1021
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it. An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functionality. To exploit the vulnerability, an attacker could run a specially crafted application. The security update addresses the vulnerability by correcting the way that WER handles and executes files.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7590
Title:
oval:org.cisecurity:def:7590: Windows Task Scheduler Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:7590
CVE-2020-1113
Severity:
Low
Description:
A security feature bypass vulnerability exists in Microsoft Windows when the Task Scheduler service fails to properly verify client connections over RPC. An attacker who successfully exploited this vulnerability could run arbitrary code as an administrator. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, a man-in-the-middle attacker would need to send a specially crafted request to a vulnerable system. The security update addresses the vulnerability by correcting how the Task Scheduler service validates connections.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7591
Title:
oval:org.cisecurity:def:7591: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7591
CVE-2020-1125
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7592
Title:
oval:org.cisecurity:def:7592: Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7592
CVE-2020-1112
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Background Intelligent Transfer Service (BITS) IIS module improperly handles uploaded content. An attacker who successfully exploited this vulnerability could upload restricted file types to an IIS-hosted folder. To exploit this vulnerability, an attacker would require permissions to upload files via BITS. An attacker could then submit a specially crafted request to upload a file. The security update addresses the vulnerability by correcting how Windows BITS validates file names.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7593
Title:
oval:org.cisecurity:def:7593: Connected User Experiences and Telemetry Service Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7593
CVE-2020-1123
Severity:
Low
Description:
A denial of service vulnerability exists when Connected User Experiences and Telemetry Service improperly handles file operations. An attacker who successfully exploited this vulnerability could cause a system to stop responding. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability. The security update addresses the vulnerability by correcting how the Connected User Experiences and Telemetry Service handles file operations.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7594
Title:
oval:org.cisecurity:def:7594: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7594
CVE-2020-1164
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7595
Title:
oval:org.cisecurity:def:7595: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7595
CVE-2020-1114
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7596
Title:
oval:org.cisecurity:def:7596: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7596
CVE-2020-1188
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7597
Title:
oval:org.cisecurity:def:7597: Windows Printer Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7597
CVE-2020-1081
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Printer Service improperly validates file paths while loading printer drivers. An authenticated attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows Printer Service validates file paths.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7598
Title:
oval:org.cisecurity:def:7598: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7598
CVE-2020-1054
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7599
Title:
oval:org.cisecurity:def:7599: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7599
CVE-2020-1184
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7600
Title:
oval:org.cisecurity:def:7600: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7600
CVE-2020-1191
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7601
Title:
oval:org.cisecurity:def:7601: Windows GDI Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7601
CVE-2020-1179
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7602
Title:
oval:org.cisecurity:def:7602: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7602
CVE-2020-1187
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7603
Title:
oval:org.cisecurity:def:7603: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7603
CVE-2020-1186
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7604
Title:
oval:org.cisecurity:def:7604: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7604
CVE-2020-1124
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7605
Title:
oval:org.cisecurity:def:7605: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7605
CVE-2020-1086
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7606
Title:
oval:org.cisecurity:def:7606: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7606
CVE-2020-1134
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7607
Title:
oval:org.cisecurity:def:7607: Windows Print Spooler Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7607
CVE-2020-1048
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted script or application. The update addresses the vulnerability by correcting how the Windows Print Spooler Component writes to the file system.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7608
Title:
oval:org.cisecurity:def:7608: Windows CSRSS Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7608
CVE-2020-1116
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Client Server Run-Time Subsystem (CSRSS) fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application. The update addresses the vulnerability by correcting how the Windows CSRSS handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7609
Title:
oval:org.cisecurity:def:7609: Windows Subsystem for Linux Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7609
CVE-2020-1075
Severity:
Low
Description:
An information disclosure vulnerability exists when Windows Subsystem for Linux improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. A attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how Windows Subsystem for Linux handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7610
Title:
oval:org.cisecurity:def:7610: Microsoft Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7610
CVE-2020-1068
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Media Service that allows file creation in arbitrary locations. To exploit the vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how the Windows Media Service handles file creation.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7611
Title:
oval:org.cisecurity:def:7611: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7611
CVE-2020-1151
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7612
Title:
oval:org.cisecurity:def:7612: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7612
CVE-2020-1143
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7613
Title:
oval:org.cisecurity:def:7613: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7613
CVE-2020-1157
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7614
Title:
oval:org.cisecurity:def:7614: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7614
CVE-2020-1136
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7615
Title:
oval:org.cisecurity:def:7615: Microsoft Color Management Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7615
CVE-2020-1117
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Color Management Module (ICM32.dll) handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. In a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability and then convince users to view the website. An attacker would have no way to force users to view the attacker-controlled content. Instead, an attacker would have to convince users to take action, typically by getting them to click a link in an email or Instant Messenger message that takes users to the attacker's website, or by opening an attachment sent through email. The security update addresses the vulnerability by correcting how Color Management Module handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7616
Title:
oval:org.cisecurity:def:7616: DirectX Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7616
CVE-2020-1140
Severity:
Low
Description:
An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7617
Title:
oval:org.cisecurity:def:7617: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7617
CVE-2020-1144
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7618
Title:
oval:org.cisecurity:def:7618: Windows State Repository Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7618
CVE-2020-1131
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows State Repository Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows State Repository Service handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7619
Title:
oval:org.cisecurity:def:7619: Windows Storage Service Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7619
CVE-2020-1138
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Storage Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges on the victim system. To exploit the vulnerability, an attacker would first have to gain execution on the victim system, then run a specially crafted application. The security update addresses the vulnerability by correcting how the Storage Services handles file operations.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7620
Title:
oval:org.cisecurity:def:7620: Windows Remote Access Common Dialog Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7620
CVE-2020-1071
Severity:
Low
Description:
An elevation of privilege vulnerability exists when Windows improperly handles errors tied to Remote Access Common Dialog. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit this vulnerability an attacker would need to physically access the booted machine to reach the logon screen. An attacker could then exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how the Windows handles errors tied to Remote Access Common Dialog.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7621
Title:
oval:org.cisecurity:def:7621: Windows Error Reporting Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7621
CVE-2020-1088
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows Error Reporting (WER) when WER handles and executes files. The vulnerability could allow elevation of privilege if an attacker can successfully exploit it. An attacker who successfully exploited the vulnerability could gain greater access to sensitive information and system functionality. To exploit the vulnerability, an attacker could run a specially crafted application. The security update addresses the vulnerability by correcting the way that WER handles and executes files.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7622
Title:
oval:org.cisecurity:def:7622: Windows Hyper-V Denial of Service Vulnerability
Type:
Software
Bulletins:
CISEC:7622
CVE-2020-0909
Severity:
Low
Description:
A denial of service vulnerability exists when Hyper-V on a Windows Server fails to properly handle specially crafted network packets. To exploit the vulnerability, an attacker would send specially crafted network packets to the Hyper-V Server. The security update addresses the vulnerability by resolving the conditions where Hyper-V would fail to properly handle these network packets.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7623
Title:
oval:org.cisecurity:def:7623: Windows Runtime Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7623
CVE-2020-1156
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows Runtime improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Runtime handles objects in memory.
Applies to:
Created:
2020-06-12
Updated:
2020-08-13

ID:
CISEC:7506
Title:
oval:org.cisecurity:def:7506: Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7506
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
Applies to:
Microsoft Edge
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7507
Title:
oval:org.cisecurity:def:7507: Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7507
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0968.
Applies to:
Microsoft Edge (EdgeHTML-based)
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7508
Title:
oval:org.cisecurity:def:7508: Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7508
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
Applies to:
Microsoft Edge
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7509
Title:
oval:org.cisecurity:def:7509: Microsoft Edge Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7509
Severity:
Low
Description:
A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory, aka 'Microsoft Edge Memory Corruption Vulnerability'.
Applies to:
Microsoft Edge
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7510
Title:
oval:org.cisecurity:def:7510: Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7510
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based), aka 'Chakra Scripting Engine Memory Corruption Vulnerability'.
Applies to:
Microsoft Edge
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7511
Title:
oval:org.cisecurity:def:7511: Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7511
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based)L, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'.
Applies to:
Microsoft Edge
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7512
Title:
oval:org.cisecurity:def:7512: Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7512
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833.
Applies to:
Microsoft Edge
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7513
Title:
oval:org.cisecurity:def:7513: Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7513
Severity:
Low
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'.
Applies to:
Internet Explorer 11
Microsoft Edge
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7514
Title:
oval:org.cisecurity:def:7514: Chakra Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7514
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge (HTML-based)L, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. (CVE-2020-0812) A remote code execution vulnerability exists in the way that the ChakraCore scripting engine handles objects in memory, aka 'Scripting Engine Memory Corruption Vulnerability'. (CVE-2020-0825)
Applies to:
Microsoft Edge
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7515
Title:
oval:org.cisecurity:def:7515: VBScript Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7515
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'.
Applies to:
Internet Explorer 11
Internet Explorer 9
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7516
Title:
oval:org.cisecurity:def:7516: Windows VBScript Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7516
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'Windows VBScript Engine Remote Code Execution Vulnerability'.
Applies to:
Internet Explorer 11
Internet Explorer 9
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7517
Title:
oval:org.cisecurity:def:7517: Internet Explorer Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7517
Severity:
Low
Description:
A remote code execution vulnerability exists when Internet Explorer improperly accesses objects in memory, aka 'Internet Explorer Memory Corruption Vulnerability'.
Applies to:
Internet Explorer 11
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7518
Title:
oval:org.cisecurity:def:7518: Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7518
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0830, CVE-2020-0831, CVE-2020-0833, CVE-2020-0848.
Applies to:
Internet Explorer 11
Internet Explorer 9
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7519
Title:
oval:org.cisecurity:def:7519: Scripting Engine Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7519
Severity:
Low
Description:
A remote code execution vulnerability exists in the way the scripting engine handles objects in memory in Microsoft browsers, aka 'Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2020-0768, CVE-2020-0823, CVE-2020-0825, CVE-2020-0826, CVE-2020-0827, CVE-2020-0828, CVE-2020-0829, CVE-2020-0831, CVE-2020-0832, CVE-2020-0833, CVE-2020-0848.
Applies to:
Internet Explorer 11
Microsoft Edge
Created:
2020-05-29
Updated:
2020-08-13

ID:
CISEC:7488
Title:
oval:org.cisecurity:def:7488: Windows Token Security Feature Bypass Vulnerability
Type:
Software
Bulletins:
CISEC:7488
CVE-2020-0981
Severity:
Low
Description:
A security feature bypass vulnerability exists when Windows fails to properly handle token relationships. An attacker who successfully exploited the vulnerability could allow an application with a certain integrity level to execute code at a different integrity level, leading to a sandbox escape. The update addresses the vulnerability by correcting how Windows handles token relationships
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7489
Title:
oval:org.cisecurity:def:7489: Windows Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7489
CVE-2020-1011
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows System Assessment Tool improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows System Assessment Tool handles file operations.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7490
Title:
oval:org.cisecurity:def:7490: Windows Kernel Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7490
CVE-2020-0913
Severity:
Low
Description:
An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7491
Title:
oval:org.cisecurity:def:7491: Win32k Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7491
CVE-2020-0956
Severity:
Low
Description:
An elevation of privilege vulnerability exists in Windows when the Windows kernel-mode driver fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses this vulnerability by correcting how the Windows kernel-mode driver handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7492
Title:
oval:org.cisecurity:def:7492: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7492
CVE-2020-0960
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7493
Title:
oval:org.cisecurity:def:7493: Windows Kernel Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7493
CVE-2020-1007
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to execute code or to elevate user rights directly, but it could be used to obtain information that could be used to try to further compromise the affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7453
Title:
oval:org.cisecurity:def:7453: Media Foundation Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7453
CVE-2020-0937
Severity:
Low
Description:
An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log onto an affected system and open a specially crafted file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The update addresses the vulnerability by correcting how Media Foundation handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7454
Title:
oval:org.cisecurity:def:7454: Windows Push Notification Service Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7454
CVE-2020-1016
Severity:
Low
Description:
An information disclosure vulnerability exists when the Windows Push Notification Service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows Push Notification Service handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7455
Title:
oval:org.cisecurity:def:7455: Windows SMBv3 Client/Server Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7455
CVE-2020-0796
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that the Microsoft Server Message Block 3.1.1 (SMBv3) protocol handles certain requests. An attacker who successfully exploited the vulnerability could gain the ability to execute code on the target server or client. To exploit the vulnerability against a server, an unauthenticated attacker could send a specially crafted packet to a targeted SMBv3 server. To exploit the vulnerability against a client, an unauthenticated attacker would need to configure a malicious SMBv3 server and convince a user to connect to it. The security update addresses the vulnerability by correcting how the SMBv3 protocol handles these specially crafted requests.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7456
Title:
oval:org.cisecurity:def:7456: Microsoft Graphics Component Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7456
CVE-2020-0987
Severity:
Low
Description:
An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The update addresses the vulnerability by correcting the way in which the Windows Graphics Component handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7457
Title:
oval:org.cisecurity:def:7457: Microsoft Graphics Components Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7457
CVE-2020-0907
Severity:
Low
Description:
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. To exploit the vulnerability, a user would have to open a specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Graphics Components handle objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7458
Title:
oval:org.cisecurity:def:7458: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7458
CVE-2020-0988
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7459
Title:
oval:org.cisecurity:def:7459: Media Foundation Memory Corruption Vulnerability
Type:
Software
Bulletins:
CISEC:7459
CVE-2020-0949
Severity:
Low
Description:
A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory. An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7460
Title:
oval:org.cisecurity:def:7460: Jet Database Engine Remote Code Execution Vulnerability
Type:
Software
Bulletins:
CISEC:7460
CVE-2020-0995
Severity:
Low
Description:
A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7461
Title:
oval:org.cisecurity:def:7461: Media Foundation Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7461
CVE-2020-0939
Severity:
Low
Description:
An information disclosure vulnerability exists when Media Foundation improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user’s system. To exploit this vulnerability, an attacker would have to log onto an affected system and open a specially crafted file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The update addresses the vulnerability by correcting how Media Foundation handles objects in memory.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7480
Title:
oval:org.cisecurity:def:7480: Windows Scheduled Task Elevation of Privilege Vulnerability
Type:
Software
Bulletins:
CISEC:7480
CVE-2020-0936
Severity:
Low
Description:
An elevation of privilege vulnerability exists when a Windows scheduled task improperly handles file redirections. An attacker who successfully exploited this vulnerability could delete a targeted file they would not have permissions to. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability. The security update addresses the vulnerability by correcting how Windows scheduled tasks handle file redirections.
Applies to:
Created:
2020-05-22
Updated:
2020-08-13

ID:
CISEC:7481
Title:
oval:org.cisecurity:def:7481: Win32k Information Disclosure Vulnerability
Type:
Software
Bulletins:
CISEC:7481
CVE-2020-0962