aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorDavid Reyna <David.Reyna@windriver.com>2018-08-10 12:56:09 -0700
committerDavid Reyna <David.Reyna@windriver.com>2018-08-10 12:56:09 -0700
commitfad6046720e0757d4d9edca0bf4c8078d40ba935 (patch)
tree26ec08124698756fb4b3fbffdf22b117f994222b
parent36a356e595fab93ed834f755b1a2efe798ac66ee (diff)
downloadsrtool-fad6046720e0757d4d9edca0bf4c8078d40ba935.tar.gz
srtool-fad6046720e0757d4d9edca0bf4c8078d40ba935.tar.bz2
srtool-fad6046720e0757d4d9edca0bf4c8078d40ba935.zip
Cummulative development update August 2018
* Add incremental NIST scans and import to CVE database * Add modified NIST scans and import to CVE database * Moved CVE details out of SRTool database to reduce size * Add CVE details lookup in cached CVE upstream files * Added edit support for Vulnerabilies and Investigations * Comments * Attachments and downloads * Product list * History audit trail * Add Vulnerability and Investigation creation from CVE triage * Add user id to session variables * Add defect import placeholder script * Modularize the fixture files for common versus site-specific setup Signed-off-by: Moayer, Puya <Puya.Moayer@windriver.com> Signed-off-by: David Reyna <David.Reyna@windriver.com>
-rwxr-xr-xbin/backup_db.sh1
-rwxr-xr-xbin/srt10
-rwxr-xr-xbin/srtool.py337
-rwxr-xr-xbin/srtool_cve.py608
-rwxr-xr-xbin/srtool_defect.py609
-rwxr-xr-xbin/srtool_utils.py435
-rwxr-xr-xdata/nvdcve-1.0-2017.json1807691
-rwxr-xr-xdata/nvdcve-1.0-2018.json30018
-rwxr-xr-xdata/nvdcve-1.0-modified.json726715
-rwxr-xr-xdata/nvdcve-1.0-spectre-meltdown.json20025
-rw-r--r--lib/orm/fixtures/common.xml100
-rw-r--r--lib/orm/fixtures/nist.xml31
-rw-r--r--lib/orm/fixtures/samples.xml117
-rw-r--r--lib/orm/fixtures/yp.xml65
-rw-r--r--lib/orm/management/commands/checksettings.py110
-rw-r--r--lib/orm/management/commands/lsupdates.py327
-rw-r--r--lib/orm/migrations/0001_initial.py68
-rw-r--r--lib/orm/models.py363
-rw-r--r--lib/srtgui/api.py146
-rw-r--r--lib/srtgui/reports.py1326
-rw-r--r--lib/srtgui/tables.py861
-rw-r--r--lib/srtgui/templates/base.html32
-rw-r--r--lib/srtgui/templates/cpes-toastertable.html3
-rw-r--r--lib/srtgui/templates/cve.html713
-rw-r--r--lib/srtgui/templates/cves-select-toastertable.html14
-rw-r--r--lib/srtgui/templates/cves-toastertable.html14
-rw-r--r--lib/srtgui/templates/cwes-toastertable.html14
-rw-r--r--lib/srtgui/templates/defect.html86
-rw-r--r--lib/srtgui/templates/defects-toastertable.html14
-rw-r--r--lib/srtgui/templates/guided_tour.html8
-rw-r--r--lib/srtgui/templates/investigation.html439
-rw-r--r--lib/srtgui/templates/investigations-toastertable.html14
-rw-r--r--lib/srtgui/templates/landing.html10
-rw-r--r--lib/srtgui/templates/login.html40
-rw-r--r--lib/srtgui/templates/manage-cpes-toastertable.html14
-rw-r--r--lib/srtgui/templates/management.html14
-rw-r--r--lib/srtgui/templates/product.html84
-rw-r--r--lib/srtgui/templates/products-toastertable.html14
-rw-r--r--lib/srtgui/templates/publish-select-toastertable.html248
-rw-r--r--lib/srtgui/templates/publish.html33
-rw-r--r--lib/srtgui/templates/published-select-toastertable.html247
-rw-r--r--lib/srtgui/templates/report.html73
-rw-r--r--lib/srtgui/templates/sources-toastertable.html72
-rw-r--r--lib/srtgui/templates/triage_cves.html10
-rw-r--r--lib/srtgui/templates/users.html20
-rw-r--r--lib/srtgui/templates/vulnerabilities-toastertable.html17
-rw-r--r--lib/srtgui/templates/vulnerability.html604
-rw-r--r--lib/srtgui/templatetags/projecttags.py6
-rw-r--r--lib/srtgui/urls.py107
-rw-r--r--lib/srtgui/views.py790
-rw-r--r--lib/srtgui/widgets.py16
-rw-r--r--lib/srtmain/settings.py6
52 files changed, 7379 insertions, 2586360 deletions
diff --git a/bin/backup_db.sh b/bin/backup_db.sh
new file mode 100755
index 00000000..e0a1d7dc
--- /dev/null
+++ b/bin/backup_db.sh
@@ -0,0 +1 @@
+./bin/srtool_utils.py -B
diff --git a/bin/srt b/bin/srt
index 3b0f2ecd..0800ab9a 100755
--- a/bin/srt
+++ b/bin/srt
@@ -143,11 +143,17 @@ else
SRT=$0
fi
+# set up base paths and definitions
export SRT_BASE_DIR=$(dirname $SRT)
SRT_BASE_DIR=$(readlink -f $SRT_BASE_DIR)
SRT_BASE_DIR=$(dirname $SRT_BASE_DIR)
MANAGE="python3 $SRT_BASE_DIR/lib/manage.py"
+# insure basic directories are present
+mkdir -p $SRT_BASE_DIR/data
+mkdir -p $SRT_BASE_DIR/data/cache
+mkdir -p $SRT_BASE_DIR/update_logs
+touch $SRT_BASE_DIR/update_logs/master_log.txt
ADDR_PORT="localhost:8000"
unset CMD
@@ -214,6 +220,10 @@ case $CMD in
echo "Failed ${CMD}."
exit 4
fi
+ # create working directories for srtool
+ mkdir -p $SRT_BASE_DIR/update_logs
+ mkdir -p $SRT_BASE_DIR/backups
+ mkdir -p $SRT_BASE_DIR/reports
# set fail safe stop system on terminal exit
trap stop_system SIGHUP
echo "Successful ${CMD}."
diff --git a/bin/srtool.py b/bin/srtool.py
deleted file mode 100755
index 4eb09cb2..00000000
--- a/bin/srtool.py
+++ /dev/null
@@ -1,337 +0,0 @@
-#!/usr/bin/env python3
-#
-# ex:ts=4:sw=4:sts=4:et
-# -*- tab-width: 4; c-basic-offset: 4; indent-tabs-mode: nil -*-
-#
-# Security Response Tool Commandline Tool
-#
-# Copyright (C) 2017 Wind River Systems
-#
-# This program is free software; you can redistribute it and/or modify
-# it under the terms of the GNU General Public License version 2 as
-# published by the Free Software Foundation.
-#
-# This program is distributed in the hope that it will be useful,
-# but WITHOUT ANY WARRANTY; without even the implied warranty of
-# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
-# GNU General Public License for more details.
-#
-# You should have received a copy of the GNU General Public License along
-# with this program; if not, write to the Free Software Foundation, Inc.,
-# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
-
-import os
-import sys
-import re
-import csv
-import xml.etree.ElementTree as ET
-import argparse
-import sqlite3
-import subprocess
-import json
-
-# setup
-lookupTable = []
-cveIndex = {}
-jiraIndex = {}
-db_change = False
-
-srtDbName = 'srt.sqlite'
-
-is_verbose = False
-
-
-#################################
-# reset sources
-#
-
-# source_data = (source_id)
-def commit_to_source(conn, source_data):
- sql = ''' UPDATE orm_datasource
- SET loaded = ?
- WHERE id = ?'''
- cur = conn.cursor()
- print("UPDATE_SCORE:%s" % str(source_data))
- cur.execute(sql, source_data)
-
-def sources(cmnd):
-
- DS_ID = 0
- DS_DATA = 1
- DS_SOURCE = 2
- DS_TYPE = 3
- DS_DESCRIPTION = 4
- DS_FILE_PATH = 5
- DS_URL = 6
- DS_LOADED = 7
-
- conn = sqlite3.connect(srtDbName)
- c = conn.cursor()
-
- print('Sources(%s)' % cmnd)
-
- c.execute("SELECT * FROM orm_datasource")
- is_change = False
- for ds in c:
- if 'set' == cmnd:
- commit_to_source(conn,(True,ds[DS_ID]))
- is_change = True
- elif 'reset' == cmnd:
- commit_to_source(conn,(False,ds[DS_ID]))
- is_change = True
- elif 'reset_not_nist' == cmnd:
- if 'nist' != ds[DS_SOURCE]:
- print("RESETTING Data source [%s] data='%s' of '%s' load state from '%s' is '%s'" % (ds[DS_ID],ds[DS_DATA],ds[DS_DESCRIPTION],ds[DS_SOURCE],ds[DS_LOADED]))
- commit_to_source(conn,(False,ds[DS_ID]))
- else:
- commit_to_source(conn,(True,ds[DS_ID]))
- is_change = True
- elif 'triage_keywords' == cmnd:
- if 'triage_keywords' == ds[DS_DATA]:
- print("RESETTING Data source [%s] data='%s' of '%s' load state from '%s' is '%s'" % (ds[DS_ID],ds[DS_DATA],ds[DS_DESCRIPTION],ds[DS_SOURCE],ds[DS_LOADED]))
- commit_to_source(conn,(False,ds[DS_ID]))
- is_change = True
- else:
- print("Data source [%s] data='%s' of '%s' load state from '%s' is '%s'" % (ds[DS_ID],ds[DS_DATA],ds[DS_DESCRIPTION],ds[DS_SOURCE],ds[DS_LOADED]))
-
- if is_change:
- conn.commit()
-
-
-#################################
-# update_scores
-#
-
-keywords_for = []
-keywords_against = []
-
-csvfile_name = 'data/keyword_filters_full.csv'
-
-def read_keywords(csvfile_name):
- # mode,type,keyword,weight
- # y,key,abiword,
-
- global keywords_for
- global keywords_against
-
- KEY_MODE=0
- KEY_TYPE=1
- KEY_KEY=2
- KEY_WEIGHT=3
-
- i_index=0
- is_header = True
- with open(csvfile_name, newline='') as csvfile:
- CPE_reader = csv.reader(csvfile, delimiter=',', quotechar='"')
- for row in CPE_reader:
- if is_header or not len(row):
- is_header = False
- continue
-
- if (KEY_WEIGHT+1) != len(row):
- print("KEY_ROWLEN_ERROR:'%s'" % row)
- continue
-
- i_index += 1
- if 0 == i_index % 100:
- print('%04d: %20s\r' % (i_index,row[KEY_KEY]), end='', file=sys.stderr)
-
-# # DEBUG ### TODO
-# if 0 < Command.debug_jira_limit:
-# if i_index > Command.debug_jira_limit:
-# return
-
- key = row[KEY_MODE]
- if '#' == key[0]:
- key = key[1:]
-
- if 'y' == key:
- keywords_for.append("%s,%s" % (row[KEY_KEY].lower(),row[KEY_WEIGHT]))
- elif 'n' == key:
- keywords_against.append("%s,%s" % (row[KEY_KEY].lower(),row[KEY_WEIGHT]))
-
- print('keywords_for = %d' % len(keywords_for))
- print('keywords_against = %d' % len(keywords_against))
-
-
-# score_data = (score,cve_id)
-def commit_score(conn, score_data):
- sql = ''' UPDATE orm_investigation
- SET score = ?
- WHERE id = ?'''
- cur = conn.cursor()
-# print("UPDATE_SCORE:%s" % str(score_data))
- cur.execute(sql, score_data)
-
-def cve_score(is_test):
- global is_verbose
- global csvfile_name
- global keywords_for
- global keywords_against
-
- read_keywords(csvfile_name)
-
- conn = sqlite3.connect(srtDbName)
- c = conn.cursor()
-
- CVE_ID = 0
- CVE_NAME = 1
- CVE_SOURCE = 2
- CVE_STATUS = 3
- CVE_WR_COMMENTS = 4
- CVE_WR_COMMENTS_PRIVATE = 5
- CVE_CVE_DATA_TYPE = 6
- CVE_CVE_DATA_FORMAT = 7
- CVE_CVE_DATA_VERSION = 8
- CVE_PUBLIC = 9
- CVE_PUBLISH = 10
- CVE_PUBLISH_DATE = 11
- CVE_DESCRIPTION = 12
- CVE_PUBLISHEDDATE = 13
- CVE_LASTMODIFIEDDATE = 14
- CVE_RECOMMEND = 15
- CVE_CPE_LIST = 16
-
- # Scan the CVEs
- c.execute("SELECT * FROM orm_cve")
-
- index = 0
- count = 0
- is_change = False
- for cve in c:
-
- list_for = ''
- list_against = ''
- total = 0
-
- for keypair in keywords_for:
- #print("keypair='%s'" % keypair)
- key,w = keypair.split(',')
- weight = 1
- if w:
- weight = int(w)
-# re.search(r'\bis\b', your_string)
- if ' '+key+' ' in ' '+cve[CVE_DESCRIPTION].lower()+' ':
- list_for += "%s," % key
- total += weight
-
- desc = ' '+cve[CVE_DESCRIPTION].lower()+' '
- for keypair in keywords_against:
- #print("keypair='%s'" % keypair)
- key,w = keypair.split(',')
- weight = -1
- if w:
- weight = int(w)
-# if key in cve[CVE_DESCRIPTION].lower():
- if ' '+key+' ' in desc:
- list_against += "%s," % key
- total += weight
-
- if list_for or list_against:
-# print("CVE=%s, DESC=%s, Total=%d, Y=%s, N=%s" % (cve[CVE_NAME],cve[CVE_DESCRIPTION][:20],total,list_for[:-1],list_against[:-1]))
- print("%s\t%s\t%s\t%s\t%s\t%s" % (cve[CVE_NAME],cve[CVE_STATUS],total,list_for[:-1],list_against[:-1],cve[CVE_DESCRIPTION]))
-
- index += 1
- if 0 == index % 10:
- print("%4d : %30s \r" % (index,cve[CVE_NAME]),end='', file=sys.stderr)
- count += 1
-# if index > 200:
-# break
-
- if is_change:
- conn.commit()
- print("Done (%d of %d)" % (count,index))
-
-
-# score_data = (score,cve_id)
-def commit_score(conn, score_data):
- sql = ''' UPDATE orm_investigation
- SET score = ?
- WHERE id = ?'''
- cur = conn.cursor()
-# print("UPDATE_SCORE:%s" % str(score_data))
- cur.execute(sql, score_data)
-
-def settings():
- global is_verbose
- global csvfile_name
- global keywords_for
- global keywords_against
-
- read_keywords(csvfile_name)
-
- conn = sqlite3.connect(srtDbName)
- c = conn.cursor()
-
- SETTING_ID = 0
- SETTING_NAME = 1
- SETTING_HELP = 2
- SETTING_VALUE = 3
-
- # Scan the CVEs
- c.execute("SELECT * FROM orm_srtsetting")
-
- index = 0
- count = 0
- is_change = False
- for setting in c:
- print("Setting[%s] = '%s'" % (setting[SETTING_NAME], setting[SETTING_VALUE][0:40]))
-
- # Scan the CVEs
- c.execute("SELECT * FROM orm_srtsetting where name = '%s'" % 'keywords_for')
-
- setting = c.fetchone()
- print("Setting2[%s] = '%s'" % (setting[SETTING_NAME], setting[SETTING_VALUE].split('|')[0]))
-
-
-
-#################################
-# main loop
-#
-
-def main(argv):
-
- # setup
- is_test = True
-
- parser = argparse.ArgumentParser(description='srtool.py: manage the SRTool database')
-
- parser.add_argument('--sources', '-s', nargs='?', const='display', help='SRTool Sources')
- parser.add_argument('--reset-sources', '-r', action='store_const', const='reset_sources', dest='command', help='Reset SRTool Sources')
- parser.add_argument('--triage-scores', '-t', action='store_const', const='cve_score', dest='command', help='Score the CVEs')
- parser.add_argument('--settings', '-S', action='store_const', const='settings', dest='command', help='Show the SRT Settings')
- parser.add_argument('--test', '-T', action='store_true', dest='is_test', help='Test database against SRTFI')
- args = parser.parse_args()
-
-# print('Args = %s' % args)
-# return
-
- is_test = False
- if None != args.is_test:
- is_test = args.is_test
-
- if args.sources:
- if args.sources.startswith('s'):
- sources("set")
- elif 0 <= args.sources.find('nist'):
- sources("reset_not_nist")
- elif args.sources.startswith('r'):
- sources("reset")
- elif args.sources.startswith('t'):
- sources("triage_keywords")
- else:
- sources("display")
- elif 'cve_score' == args.command:
- cve_score(is_test)
- elif 'settings' == args.command:
- settings()
- else:
- print("Command not found")
-
-if __name__ == '__main__':
- global script_pathname
- script_pathname=os.path.dirname(sys.argv[0])
- main(sys.argv[1:])
-
-
-
diff --git a/bin/srtool_cve.py b/bin/srtool_cve.py
new file mode 100755
index 00000000..343b8138
--- /dev/null
+++ b/bin/srtool_cve.py
@@ -0,0 +1,608 @@
+#!/usr/bin/env python3
+#
+# ex:ts=4:sw=4:sts=4:et
+# -*- tab-width: 4; c-basic-offset: 4; indent-tabs-mode: nil -*-
+#
+# Security Response Tool Commandline Tool
+#
+# Copyright (C) 2018 Wind River Systems
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2 as
+# published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License along
+# with this program; if not, write to the Free Software Foundation, Inc.,
+# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+
+### Usage Examples (run from top level directory)
+# Updating a specific NIST feed: ./bin/srtool.py -u "NIST JSON Data 2017"
+# Updating with the NIST incremental feed: ./bin/srtool.py -U
+
+import os
+import sys
+import re
+import csv
+import xml.etree.ElementTree as ET
+import argparse
+import sqlite3
+import subprocess
+import json
+import urllib
+
+try:
+ from datetime import datetime, date
+ from urllib.request import urlopen, URLError
+ from urllib.parse import urlparse
+except ImportError:
+ from urllib2 import urlopen, URLError
+ from urlparse import urlparse
+
+# setup
+lookupTable = []
+cveIndex = {}
+db_change = False
+
+srtDbName = 'srt.sqlite'
+is_verbose = False
+
+keywords_for = []
+keywords_against = []
+
+#################################
+# Helper methods
+#
+
+overrides = {}
+
+def set_override(key,value=None):
+ if not value is None:
+ overrides[key] = value
+ elif key in os.environ.keys():
+ overrides[key] = 'yes' if os.environ[key].startswith('1') else 'no'
+ else:
+ overrides[key] = ''
+ print("OVERRIDE: %s = %s" % (key,overrides[key]))
+
+def get_override(key):
+ if key in overrides.keys():
+ return overrides[key]
+ return ''
+
+
+#################################
+# check for updates and apply if any
+#
+# Change orm_datasource schema to make LastModifiedDate a datetime object
+# datetime and urllib imports may be in an inappropriate location (top of file currently)
+
+#gets CVE-Modified feed, determines if we are out of date, and applies updates if true
+#tracks history in update_log.txt
+#incremental argument is boolean that idicates if bulk updating or incremental updating.
+def update_nist(datasource_description, incremental):
+ DS_ID = 0
+ DS_DATA = 1
+ DS_SOURCE = 2
+ DS_TYPE = 3
+ DS_DESCRIPTION = 4
+ DS_FILE_PATH = 5
+ DS_URL = 6
+ DS_LOADED = 7
+ DS_META_URL = 8
+ DS_LAST_MODIFIED_DATE = 9
+
+ #update log (1=Monday, 7= Sunday)
+ today = datetime.today()
+ weeknum = today.strftime("%W")
+ weekday = today.isoweekday()
+ log = open(os.path.join(SRT_BASE_DIR,"update_logs/update_nist_log_%s_%s.txt" % (weeknum, weekday)), "a")
+
+
+ #ensure cache folder exists (clear cache during "run_all_updates()" from "srtool_utils.py")
+ path = os.path.join(SRT_BASE_DIR, "data/cache")
+ try:
+ os.makedirs(path)
+ except:
+ pass
+
+ # Set up database connection
+ conn = sqlite3.connect(srtDbName)
+ c = conn.cursor()
+
+ # Fetch the keywords used to generate recommendation scores
+ global keywords_for
+ global keywords_against
+ sql = "SELECT * FROM orm_srtsetting WHERE name=?"
+ keywords_for = c.execute(sql, ("keywords_for",)).fetchone()[3].split("|")
+ keywords_against = c.execute(sql, ("keywords_against",)).fetchone()[3].split("|")
+
+ sql = "SELECT * FROM orm_datasource WHERE description='%s'" % datasource_description
+ c.execute(sql)
+ for ds in c:
+ try:
+ f = urlopen(ds[DS_META_URL]) #Note: meta files are not in json format, hence manual parse
+ content = f.readline().decode('UTF-8')
+ date_new = datetime.strptime(content, 'lastModifiedDate:%Y-%m-%dT%H:%M:%S-04:00\r\n')
+ date_past = datetime.strptime(ds[DS_LAST_MODIFIED_DATE], '%Y-%m-%d %H:%M:%S')
+
+ log.write("BEGINNING NIST UPDATES\n")
+ #determine if we are out of date and apply updates if true
+ if (date_new > date_past):
+ pre_update_time = datetime.now() #used for logging purposes only
+
+ nist_json(ds[DS_FILE_PATH], ds[DS_URL], ds[DS_ID], ds[DS_FILE_PATH], log, date_past, incremental)
+ log.write("began updates: %s\n" % str(pre_update_time))
+ log.write("finished updates: %s\n" % str(datetime.now()) )
+ log.write("=============================================================================\n")
+ log.write("\n")
+
+ #update datasource's lastModifiedDate after successsfuly updating it
+ sql = "UPDATE orm_datasource SET lastModifiedDate = ? WHERE id='%s'" % ds[DS_ID]
+ #c.execute(sql, (str(date_new),))
+ conn.commit()
+ else:
+
+ log.write("No update needed\n")
+ log.write("Checked: %s\n" % datetime.now())
+ log.write("=============================================================================\n")
+ log.write("\n")
+ print("NO UPDATE NEEDED")
+
+ # Reset datasource's update_time as today
+ sql = "UPDATE orm_datasource SET update_time = ? WHERE id='%s'" % ds[DS_ID]
+ c.execute(sql, (datetime.today().strftime('%Y-%m-%d %H:%M:%S'),) )
+ conn.commit()
+
+ #######
+ ## TESTING PURPOSES ONLY: reset lastModifiedDate so will always need update!
+ #######
+ # sql = '''UPDATE orm_datasource
+ # SET lastModifiedDate = "0001-01-01 01:01:01"
+ # WHERE description="NIST JSON Modified Data 2017" '''
+ # c.execute(sql)
+ # conn.commit()
+
+ f.close()
+ except URLError as e:
+ raise Exception("Failed to open %s: %s" % (href, e.reason))
+ continue
+ log.close()
+ c.close()
+ conn.close()
+
+def nist_scan_configuration_or(cve, cpe_or_node, name, and_enum):
+ cpe_list = '[or]|'
+ for cpe in cpe_or_node['cpe']:
+ cpe23Uri = cpe['cpe23Uri']
+ if 'cpeMatchString' in cpe:
+ cpeMatchString = cpe['cpeMatchString']
+ else:
+ cpeMatchString = ''
+ if 'versionEndIncluding' in cpe:
+ versionEndIncluding = cpe['versionEndIncluding']
+ else:
+ versionEndIncluding = ''
+ cpe_list += '%s,%s,%s,%s|' % (cpe['vulnerable'],cpe23Uri,cpeMatchString,versionEndIncluding)
+ cpe_list += '[/or]|'
+ return cpe_list
+
+#parses JSON, creates CVE object, and updates database as necessary. Commits to database on success
+#will EITHER create new record in orm_cve if cve does not exist OR overwrite every field if existing cve out-of-date OR ignore cve
+#requires json to be formatted with NIST Json schema (https://csrc.nist.gov/schema/nvd/feed/0.1/nvd_cve_feed_json_0.1_beta.schema)
+def nist_json(file_path, json_url, datasource_id, datasource_filename, log, date_past, incremental):
+ import traceback
+ import gzip
+ import requests
+
+ response = urlopen(json_url)
+ dct = json.loads(gzip.decompress(response.read()).decode('utf-8')) #uncompress and decode json.gz
+
+ #save datasource feed to "data"
+ datasource_file = open(os.path.join(SRT_BASE_DIR, datasource_filename), 'w+')
+ datasource_file.write(json.dumps(dct))
+
+ conn = sqlite3.connect(srtDbName)
+ c = conn.cursor()
+
+ CVE_Items = dct['CVE_Items']
+ total = len(CVE_Items)
+ v = Cve()
+
+ cache_path = os.path.join(SRT_BASE_DIR, "data/cache")
+ #begin parsing each cve in the JSON data
+ for i, CVE_Item in enumerate(CVE_Items):
+ # Development support
+ if get_override('SRTDBG_MINIMAL_DB') and (i > 10):
+ break
+
+ cve = CVE_Item['cve']
+ references = cve['references']['reference_data']
+ CVE_data_meta = cve['CVE_data_meta']['ID']
+
+ #if cve exists in cache, delete it
+ cve_path = os.path.join(cache_path, CVE_data_meta + ".json")
+ if (os.path.isfile(cve_path)):
+ os.remove(cve_path)
+
+ #if incremental update, save json copy of the cve to cache
+ if incremental:
+ file = open(cve_path, 'w+')
+ file.write(json.dumps(CVE_Item))
+
+ #print('.', end='', flush=True)
+ print('[%4d]%30s\r' % ((i * 100)/ total, CVE_data_meta), end='', flush=True)
+ try:
+ v.name = CVE_data_meta
+ v.source = 'NIST'
+ v.datasource = datasource_id
+
+ v.cve_data_type = cve['data_type']
+ v.cve_data_format = cve['data_format']
+ v.cve_data_version = cve['data_version']
+
+ v.description = cve['description']['description_data'][0]['value']
+ v.publishedDate = re.sub('T.*','',CVE_Item['publishedDate'])
+ v.lastModifiedDate = re.sub('T.*','',CVE_Item['lastModifiedDate'])
+ v.public = True #always true since NIST is public source
+ v.publish = Cve.PUBLISH_PUBLISHED
+ v.publish_date = v.publishedDate
+
+ if ('impact' in CVE_Item) and ('baseMetricV3' in CVE_Item['impact']):
+ baseMetricV3 = CVE_Item['impact']['baseMetricV3']
+ v.cvssV3_baseScore = baseMetricV3['cvssV3']['baseScore']
+ v.cvssV3_baseSeverity = baseMetricV3['cvssV3']['baseSeverity']
+ # v.cvssV3_vectorString = baseMetricV3['cvssV3']['vectorString']
+ # v.cvssV3_exploitabilityScore = baseMetricV3['exploitabilityScore']
+ # v.cvssV3_impactScore = baseMetricV3['impactScore']
+ # v.cvssV3_attackVector = baseMetricV3['cvssV3']['attackVector']
+ # v.cvssV3_attackComplexity = baseMetricV3['cvssV3']['attackComplexity']
+ # v.cvssV3_privilegesRequired = baseMetricV3['cvssV3']['privilegesRequired']
+ # v.cvssV3_userInteraction = baseMetricV3['cvssV3']['userInteraction']
+ # v.cvssV3_scope = baseMetricV3['cvssV3']['scope']
+ # v.cvssV3_confidentialityImpact = baseMetricV3['cvssV3']['confidentialityImpact']
+ # v.cvssV3_integrityImpact = baseMetricV3['cvssV3']['integrityImpact']
+ # v.cvssV3_availabilityImpact = baseMetricV3['cvssV3']['availabilityImpact']
+ if ('impact' in CVE_Item) and ('baseMetricV2' in CVE_Item['impact']):
+ baseMetricV2 = CVE_Item['impact']['baseMetricV2']
+ v.cvssV2_baseScore = baseMetricV2['cvssV2']['baseScore']
+ # v.cvssV2_severity = baseMetricV2['severity']
+ # v.cvssV2_vectorString = baseMetricV2['cvssV2']['vectorString']
+ # v.cvssV2_exploitabilityScore = baseMetricV2['exploitabilityScore']
+ # v.cvssV2_impactScore = baseMetricV2['exploitabilityScore']
+ # v.cvssV2_accessVector = baseMetricV2['cvssV2']['accessVector']
+ # v.cvssV2_accessComplexity = baseMetricV2['cvssV2']['accessComplexity']
+ # v.cvssV2_authentication = baseMetricV2['cvssV2']['authentication']
+ # v.cvssV2_confidentialityImpact = baseMetricV2['cvssV2']['confidentialityImpact']
+ # v.cvssV2_integrityImpact = baseMetricV2['cvssV2']['integrityImpact']
+
+ # configurations = CVE_Item['configurations']
+ # is_first_and = True
+ # for i, config in enumerate(configurations['nodes']):
+ # v.cpe_list += '[config]|'
+ # v.cpe_list += '[and]|'
+ # if "AND" == config['operator']:
+ # # create AND record
+ # if not is_first_and:
+ # v.cpe_list += '[/and]|'
+ # v.cpe_list += '[and]|'
+ # #is_first_and = False
+ # if 'children' in config:
+ # for j, cpe_or_node in enumerate(config['children']):
+ # if "OR" == cpe_or_node['operator']:
+ # v.cpe_list += nist_scan_configuration_or(v,cpe_or_node, CVE_data_meta, j)
+ # else:
+ # print("ERROR CONFIGURE:OR_OP?:%s" % cpe_or_node['operator'])
+ # elif "OR" == config['operator']:
+ # v.cpe_list += nist_scan_configuration_or(v,config, CVE_data_meta, 0)
+ # else:
+ # print("ERROR CONFIGURE:OP?:%s" % config_rec['operator'])
+ # v.cpe_list += '[/and]|'
+ # v.cpe_list += '[/config]|'
+
+
+ #check if cve object `v` need to be uploaded to database (cases: new cve, modified cve, or no changes)
+ #if true, apply changes. Else ignore and continue
+ v_id, is_change = sql_cve_query(conn, v, log)
+
+
+ #if CVE `v` updates, must check and update associated records (CWEs, references, and CVE2CWE)
+ #sql_reference_query, sql_cwe_query, and sql_cve2cwe_query require valid CVE record primary key at some point during their execution, therefore must always be after call to sql_cve_query
+ if is_change:
+ r = Reference()
+ for ref in references:
+ r.cve_id = v_id
+ r.hyperlink = ref['url']
+ sql_reference_query(conn, r)
+
+ problem_list = cve['problemtype']['problemtype_data']
+ for problem_Item in problem_list:
+ description_list = problem_Item['description']
+ for description_Item in description_list:
+ value = description_Item['value']
+ cwe_id = sql_cwe_query(conn, value)
+ sql_cve2cwe_query(conn, v_id, cwe_id)
+
+ except Exception as e:
+ print(traceback.format_exc())
+ print("UPDATE FAILED")
+ c.close()
+ conn.close()
+ return
+ print()
+ log.write("total number of CVEs checked: %s\n" % total)
+ conn.commit()
+ c.close()
+ conn.close()
+
+#################################
+# cve class
+#
+class Cve():
+ # WR Status
+ NEW = 0
+ EXCLUDE = 1
+ INVESTIGATE = 2
+ VULNERABLE = 3
+ NOT_VULNERABLE = 4
+ STATUS = (
+ (NEW, 'New'),
+ (EXCLUDE, 'Exclude'),
+ (INVESTIGATE, 'Investigate'),
+ (VULNERABLE, 'Vulnerable'),
+ (NOT_VULNERABLE, 'Not Vulnerable'),
+ )
+
+ # Publish options
+ PUBLISH_UNPUBLISHED = 0
+ PUBLISH_NOPUBLISH = 1
+ PUBLISH_PUBLISHED = 2
+ PUBLISH_REQUEST = 3
+ PUBLISH_UPDATE = 4
+ PUBLISH_SUBMITTED = 5
+
+ # index - primary key
+ id = -1
+
+ name = ''
+ datasource = 0
+
+ source = ''
+ priority = 0
+ status = NEW
+
+ comments = ''
+ comments_private = ''
+
+ cve_data_type = ''
+ cve_data_format = ''
+ cve_data_version = ''
+
+ public = False
+ publish_state = PUBLISH_UNPUBLISHED
+ publish_date = ''
+
+ description = ''
+ publishedDate = ''
+ lastModifiedDate = ''
+ problemtype = ''
+
+ # cpe_list = ''
+
+ cvssV3_baseScore = ''
+ cvssV3_baseSeverity = ''
+ # cvssV3_vectorString = ''
+ # cvssV3_exploitabilityScore = ''
+ # cvssV3_impactScore = ''
+ # cvssV3_attackVector = ''
+ # cvssV3_attackComplexity = ''
+ # cvssV3_privilegesRequired = ''
+ # cvssV3_userInteraction = ''
+ # cvssV3_scope = ''
+ # cvssV3_confidentialityImpact = ''
+ # cvssV3_integrityImpact = ''
+ # cvssV3_availabilityImpact = ''
+
+ cvssV2_baseScore = ''
+ cvssV2_severity = ''
+ # cvssV2_vectorString = ''
+ # cvssV2_exploitabilityScore = ''
+ # cvssV2_impactScore = ''
+ # cvssV2_accessVector = ''
+ # cvssV2_accessComplexity = ''
+ # cvssV2_authentication = ''
+ # cvssV2_confidentialityImpact = ''
+ # cvssV2_integrityImpact = ''
+
+ recommend = 0
+ recommend_list = []
+
+ #generates importance score based on key-words in description of CVE, higher indicates more important
+ def recommendation(self):
+ description = ' '+self.description.lower()+' '
+ total = 0
+ list = ''
+
+ for keypair in keywords_for:
+ #print("keypair='%s'" % keypair)
+ key,w = keypair.split(',')
+ weight = 1
+# if w:
+# weight = int(w)
+ #if ' '+key+' ' in description:
+ if re.search(r'\b%s\b' % key, description):
+ list += ",+%s" % key
+ total += weight
+
+ for keypair in keywords_against:
+ #print("keypair='%s'" % keypair)
+ key,w = keypair.split(',')
+ weight = 1
+# if w:
+# weight = int(w)
+ # re.search(r'\bis\b', your_string)
+ #if ' '+key+' ' in description:
+ #if re.search(re.escape(r'\b%s\b' % key), description):
+ if re.search(r'\b%s\b' % key, description):
+ list += ",-%s" % key
+ total -= weight
+
+ # set filter maximums
+ if total < -3:
+ total = -3
+ if total > 3:
+ total = 3
+ self.recommend = total
+ self.recommend_list = list[1:]
+
+#generates and executes appropriate SQLite query for CVE depending on situation
+#new CVE -> INSERT || modified CVE -> UPDATE || no change -> ignore and return
+#returns (CVE_ID, BOOL) tuple, True if insert or update executed
+### THIS DOES NOT CALL CONNECTION.COMMIT()
+def sql_cve_query(conn, cve, log):
+ CVE_LASTMODIFIEDDATE = 14
+ is_change = False
+ cur = conn.cursor()
+ sql = '''SELECT * FROM orm_cve WHERE name=?'''
+ exists = cur.execute(sql, (cve.name,)).fetchone()
+ cve_id = -1
+ if exists is None:
+ cve.recommendation()
+ sql = ''' INSERT into orm_cve (name, source, datasource_id, priority, status, comments, comments_private, cve_data_type, cve_data_format, cve_data_version, public, publish_state, publish_date, description, publishedDate, lastModifiedDate, recommend, recommend_list, cvssV3_baseScore, cvssV3_baseSeverity, cvssV2_baseScore, cvssV2_severity)
+ VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)'''
+ cur.execute(sql, (cve.name, cve.source, cve.datasource, cve.priority, cve.status, cve.comments, cve.comments_private, cve.cve_data_type, cve.cve_data_format, cve.cve_data_version, 1, cve.publish_state, cve.publish_date, cve.description, cve.publishedDate, cve.lastModifiedDate, cve.recommend, cve.recommend_list, cve.cvssV3_baseScore, cve.cvssV3_baseSeverity, cve.cvssV2_baseScore, cve.cvssV2_severity))
+ is_change = True
+ cve_id = cur.lastrowid
+ log.write("\tINSERTED '%s'\n" % cve.name)
+ elif exists[CVE_LASTMODIFIEDDATE] < cve.lastModifiedDate:
+ cve.recommendation()
+ sql = ''' UPDATE orm_cve
+ SET source = ?,
+ recommend = ?,
+ recommend_list = ?,
+ cve_data_type = ?,
+ cve_data_format = ?,
+ cve_data_version = ?,
+ description = ?,
+ lastModifiedDate = ?,
+ cvssV3_baseScore = ?,
+ cvssV3_baseSeverity = ?,
+ cvssV2_baseScore = ?,
+ cvssV2_severity = ?
+ WHERE id = ?'''
+ cur.execute(sql, (cve.source, cve.recommend, cve.recommend_list, cve.cve_data_type, cve.cve_data_format, cve.cve_data_version, cve.description, cve.lastModifiedDate, cve.cvssV3_baseScore, cve.cvssV3_baseSeverity, cve.cvssV2_baseScore, cve.cvssV2_severity, exists[0]))
+ is_change = True
+ log.write("\tUPDATED '%s'\n" % cve.name)
+ cve_id = exists[0]
+ else:
+ is_change = False
+ log.write("\tSKIPPED '%s'\n" % cve.name)
+ cur.close()
+ return (cve_id, is_change)
+
+
+#################################
+# reference
+#
+class Reference():
+ cve_id = -1
+ hyperlink = ''
+ resource = ''
+ type_ = ''
+ source = ''
+ name = ''
+
+#generates and executes appropriate SQLite query for a new reference
+### THIS DOES NOT CALL CONNECTION.COMMIT()
+def sql_reference_query(conn, ref):
+ cur = conn.cursor()
+ sql = '''SELECT 1 FROM orm_cvereference WHERE hyperlink=?'''
+ record = cur.execute(sql, (ref.hyperlink,)).fetchone()
+ if record is None:
+ sql = '''INSERT INTO orm_cvereference (cve_id, hyperlink) VALUES (?, ?)'''
+ cur.execute(sql, (ref.cve_id, ref.hyperlink))
+ cur.close()
+
+#################################
+# cwe and cve2cwe
+#
+
+#generates and executes appropriate SQLite query for a new CWE
+#returns CWE_ID
+### THIS DOES NOT CALL CONNECTION.COMMIT()
+def sql_cwe_query(conn, value):
+ cur = conn.cursor()
+ sql = '''SELECT 1 FROM orm_cwetable WHERE name=?'''
+ cwe = cur.execute(sql, (value,)).fetchone()
+ if cwe is None:
+ sql = '''INSERT INTO orm_cwetable (name, name_sort, href, summary, description, vulnerable_count, found) VALUES (?,'','','','',1,1)'''
+ cur.execute(sql, (value,))
+ cwe = cur.lastrowid
+ cur.close()
+ return cwe
+ cur.close()
+ return cwe[0]
+
+#generates and executes appropriate SQLite query for new CVE to CWE relation
+### THIS DOES NOT CALL CONNECTION.COMMIT()
+def sql_cve2cwe_query(conn, cve_id, cwe_id):
+ cur = conn.cursor()
+ sql = '''SELECT * FROM orm_cvetocwe WHERE cve_id=? AND cwe_id=?'''
+ cve2cwe = cur.execute(sql, (cve_id, cwe_id))
+ if cve2cwe is None:
+ sql = '''INSERT INTO orm_cvetocwe (cve_id, cwe_id) VALUES (?, ?)'''
+ cur.execute(sql, (cve_id, cwe_id))
+ cur.close()
+
+#################################
+# main loop
+#
+
+def main(argv):
+ parser = argparse.ArgumentParser(description='srtool_cve.py: manage the CVEs within SRTool database')
+
+ parser.add_argument('--update_nist', '-n', nargs=1, help='Check nvd.nist.gov/vuln/data-feeds for updates on a specified datasource')
+ parser.add_argument('--update_nist_incremental', '-i', action='store_const', const='update_nist_incremental', dest='command', help='Check nvd.nist.gov/vuln/data-feeds for updates')
+ args = parser.parse_args()
+
+ master_log = open(os.path.join(SRT_BASE_DIR, "update_logs/master_log.txt"), "a")
+
+ if args.update_nist:
+ try:
+ print ("BEGINNING NIST UPDATES PLEASE WAIT ... this can take some time")
+ update_nist(args.update_nist[0], False)
+ master_log.write("SRTOOL:%s:%s:\t\t\t...\t\t\tUPDATED\n" % (date.today(), args.update_nist[0]))
+ print("DATABASE UPDATE FINISHED\n")
+ except Exception as e:
+ print("DATABASE UPDATED FAILED ... %s" % e)
+ master_log.write("SRTOOL:%s:%s:\t\t\t...\t\t\tFAILED ... %s\n" % (date.today(), args.update_nist[0], e))
+ elif 'update_nist_incremental' == args.command:
+ try:
+ print ("BEGINNING NIST UPDATES PLEASE WAIT ... this can take some time")
+ update_nist('NIST JSON Modified Data', True)
+ master_log.write("SRTOOL:%s:'NIST JSON Modified Data':\t\t\t...\t\t\tUPDATED\n" % date.today())
+ print("DATABASE UPDATE FINISHED\n")
+ except Exception as e:
+ print("DATABASE UPDATED FAILED ... %s" % e)
+ master_log.write("SRTOOL:%s:%s:\t\t\t...\t\t\tFAILED ... %s\n" % (date.today(), 'NIST JSON Modified Data', e))
+
+ else:
+ print("Command not found")
+ master_log.close()
+
+if __name__ == '__main__':
+ global SRT_BASE_DIR
+ from os.path import abspath
+ # fetch any environment overrides
+ set_override('SRTDBG_SKIP_CVE_IMPORT')
+ set_override('SRTDBG_MINIMAL_DB')
+ if get_override('SRTDBG_SKIP_CVE_IMPORT'):
+ exit(0)
+
+ SRT_BASE_DIR = os.path.abspath(os.path.dirname(os.path.dirname(sys.argv[0])))
+
+ main(sys.argv[1:])
diff --git a/bin/srtool_defect.py b/bin/srtool_defect.py
new file mode 100755
index 00000000..7cee1f85
--- /dev/null
+++ b/bin/srtool_defect.py
@@ -0,0 +1,609 @@
+#!/usr/bin/env python3
+#
+# ex:ts=4:sw=4:sts=4:et
+# -*- tab-width: 4; c-basic-offset: 4; indent-tabs-mode: nil -*-
+#
+# Security Response Tool Commandline Tool
+#
+# Copyright (C) 2018 Wind River Systems
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2 as
+# published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License along
+# with this program; if not, write to the Free Software Foundation, Inc.,
+# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+
+### Usage Examples (run from top level directory)
+# Updating defect Issues: ./bin/srtool_defect.py --update
+
+
+import os
+import sys
+import re
+import csv
+import xml.etree.ElementTree as ET
+import argparse
+import sqlite3
+import subprocess
+import json
+import urllib
+from time import sleep
+
+try:
+ from datetime import datetime, date
+ from urllib.request import urlopen, URLError
+ from urllib.parse import urlparse
+except ImportError:
+ from urllib2 import urlopen, URLError
+ from urlparse import urlparse
+
+srtDbName = 'srt.sqlite'
+
+#################################
+# Helper methods
+#
+
+overrides = {}
+
+def set_override(key,value=None):
+ if not value is None:
+ overrides[key] = value
+ elif key in os.environ.keys():
+ overrides[key] = 'yes' if os.environ[key].startswith('1') else 'no'
+ else:
+ overrides[key] = ''
+ print("OVERRIDE: %s = %s" % (key,overrides[key]))
+
+def get_override(key):
+ if key in overrides.keys():
+ return overrides[key]
+ return ''
+
+#################################
+# Access Rights
+#
+srt_user = os.environ.get('SRT_USER')
+srt_passwd = os.environ.get('SRT_PASSWD')
+if not srt_user:
+ srt_user = 'user'
+if not srt_passwd:
+ srt_user = 'passwd'
+
+#################################
+# class to hold fields of a defect
+#
+class Defect:
+ id = -1
+ name = ''
+ summary = ''
+ url = ''
+ priority = -1
+ status = 0
+ resolution = 0
+ publish = 'Unpublished'
+
+ # Fixed release
+ release_version = ''
+
+ product_id = 1
+ date_created = ''
+ date_updated = ''
+
+ project = ''
+
+ # extra fields
+ cve_status = 0
+ vi_status = 0
+ vi_outcome = 0
+
+#################################
+# import defect states
+#
+#if too slow, change to check update times and ignore those that need nothing (should do anyway to be honest...)
+#can also move parsing JSON so that it doesnt happen if record is up to date
+
+def update_defects():
+ try:
+ ### TODO: open connection to defect database
+ # defect_db = ...
+ pass
+ except Exception as e:
+ print("CONNECTION TO DEFECT DATABASE FAILED")
+ return
+
+ conn = sqlite3.connect(srtDbName)
+ c = conn.cursor()
+
+ today = datetime.today()
+ weeknum = today.strftime("%W")
+ weekday = today.isoweekday()
+
+ log = open("./update_logs/update_defects_log_%s_%s.txt" % (weeknum, weekday), "a")
+
+
+ PRODUCT_ID = 0
+ PRODUCT_NAME = 1
+ PRODUCT_VERSION = 2
+ PRODUCT_PROFILE = 3
+ PRODUCT_PREFIX = 6
+
+ DEFECT_ID = 0
+ DEFECT_DATE_UPDATED = 10
+
+ PUBLISHED_FIELD = 'customfield_10010'
+ FIX_VERSION_FIELD = 'customfield_11002'
+
+ log.write("BEGINNING DEFECT UPDATES\n")
+ pre_update_time = datetime.now()
+
+ products = c.execute('''SELECT * FROM orm_product''').fetchall()
+ for i,product in enumerate(products):
+
+ if get_override('SRTDBG_MINIMAL_DB') and (i > 1):
+ break
+
+ #specify which fields to get in order to speed up request!
+ #print("\tupdating ... " + product[PRODUCT_NAME] + " " + product[PRODUCT_VERSION] + " " + product[PRODUCT_PROFILE] + "\tloading " + spinner[block_num % 3], end='\r', flush=True)
+ log.write("\tUPDATING ... " + product[PRODUCT_NAME] + " " + product[PRODUCT_VERSION] + " " + product[PRODUCT_PROFILE] + "\n")
+
+ block_size = 500
+ block_num = 0
+ spinner = [' ', '. ', '.. ', '...']
+ while True:
+ print("\tloading" + spinner[block_num % 4] + "\t" + product[PRODUCT_NAME] + " " + product[PRODUCT_VERSION] + " " + product[PRODUCT_PROFILE], flush=True)
+ start_idx = block_num*block_size
+
+ #searches current project's bug issues that contain "cve" in their text
+ ### TODO: FETCH DEFECT RECORDS FOR THIS PRODUCT FROM DEFECT DATABASE
+
+ if len(issues) == 0:
+ # Retrieve issues until there are no more to come
+ break
+ # Development support
+ block_num += 1
+ update_project_issues(product, issues, conn, log)
+ conn.commit() #commit to db after each block
+ sleep(1.0) # give time for Sqlite to sync
+ print("\tfinished \t" + product[PRODUCT_NAME] + " " + product[PRODUCT_VERSION] + " " + product[PRODUCT_PROFILE], flush=True)
+ conn.commit()
+ log.write("began updates: %s\n" % str(pre_update_time))
+ log.write("finished updates: %s\n" % str(datetime.now()))
+ log.write("=============================================================================\n")
+ log.write("\n")
+
+ # Reset datasource's update_time as today
+ sql = "UPDATE orm_datasource SET update_time=?,lastModifiedDate=? WHERE data='defect_status'"
+ date_string = datetime.today().strftime('%Y-%m-%d %H:%M:%S')
+ c.execute(sql, (date_string,date_string,) )
+ conn.commit()
+
+ c.close()
+ conn.close()
+
+#############################################################################3
+###
+
+def new_vulnerability_name(c):
+ CVI_ID = 0
+ CVI_VALUE = 3
+ sql = "SELECT * FROM orm_srtsetting WHERE name='current_vulnerability_index'"
+ cvi = c.execute(sql).fetchone()
+ if not cvi:
+ index = 100
+ sql = '''INSERT INTO orm_srtsetting (name, helptext, value) VALUES (?,?,?)'''
+ c.execute(sql, ('current_vulnerability_index', '', index))
+ else:
+ index = int(cvi[CVI_VALUE]) + 1
+ sql = '''UPDATE orm_srtsetting SET value=? WHERE id = ?'''
+ c.execute(sql, (index, cvi[CVI_ID]))
+ return "V%05d" % index
+
+def new_investigation_name(c):
+ CVI_ID = 0
+ CVI_VALUE = 3
+ sql = "SELECT * FROM orm_srtsetting WHERE name='current_investigation_index'"
+ cvi = c.execute(sql).fetchone()
+ if not cvi:
+ index = 100
+ sql = '''INSERT INTO orm_srtsetting (name, helptext, value) VALUES (?,?,?)'''
+ c.execute(sql, ('current_investigation_index', '', index))
+ else:
+ index = int(cvi[CVI_VALUE]) + 1
+ sql = '''UPDATE orm_srtsetting SET value=? WHERE id = ?'''
+ c.execute(sql, (index, cvi[CVI_ID]))
+ return "I%05d" % index
+
+def translate_priority(j,p):
+ MINOR = 0
+ LOW = 1
+ MEDIUM = 2
+ HIGH = 3
+ Priority = (
+ (MINOR, 'P4'),
+ (LOW, 'P3'),
+ (MEDIUM, 'P2'),
+ (HIGH, 'P1'),
+ )
+ for i in range(len(Priority)):
+ if p == Priority[i][1]:
+ return str(Priority[i][0])
+ print("ERROR: unknown priority string '%s=%s'" % (j,p))
+ log.write("ERROR: unknown priority string '%s=%s'" % (j,p))
+ return '0'
+
+def translate_status(j,s):
+ OPEN = 0
+ IN_PROGRESS = 1
+ ON_HOLD = 2
+ CHECKED_IN = 3
+ RESOLVED = 4
+ CLOSED = 5
+ Status = (
+ (OPEN, 'Open'),
+ (IN_PROGRESS, 'In progress'),
+ (ON_HOLD, 'On Hold'),
+ (CHECKED_IN, 'Checked In'),
+ (RESOLVED, 'Resolved'),
+ (CLOSED, 'Closed'),
+ )
+ for i in range(len(Status)):
+ if s == Status[i][1]:
+ return str(Status[i][0])
+ print("ERROR: unknown status string '%s=%s'" % (j,s))
+ log.write("ERROR: unknown status string '%s=%s'" % (j,s))
+ return '0'
+
+def translate_resolution(j,r):
+ UNRESOLVED = 0
+ RESOLVED = 1
+ FIXED = 2
+ WILL_NOT_FIX = 3
+ WITHDRAWN = 4
+ REJECTED = 5
+ DUPLICATE = 6
+ NOT_APPLICABLE = 7
+ REPLACED_BY_REQUIREMENT = 8
+ CANNOT_REPRODUCE = 9
+ DONE = 10
+
+ CVE_NEW = 0
+ CVE_INVESTIGATE = 1
+ CVE_VULNERABLE = 2
+ CVE_NOT_VULNERABLE = 3
+ VI_INVESTIGATE = 0
+ VI_NOT_VULNERABLE = 1
+ VI_VULNERABLE = 2
+ VI_OPEN = 0
+ VI_CLOSED = 1
+ VI_FIXED = 2
+ VI_NOT_FIX = 3
+
+ Resolution = (
+ (UNRESOLVED, 'Unresolved', CVE_VULNERABLE,VI_VULNERABLE,VI_OPEN),
+ (RESOLVED, 'Resolved', CVE_VULNERABLE,VI_VULNERABLE,VI_FIXED),
+ (FIXED, 'Fixed', CVE_VULNERABLE,VI_VULNERABLE,VI_FIXED),
+ (WILL_NOT_FIX, 'Won\'t Fix', CVE_VULNERABLE,VI_VULNERABLE,VI_NOT_FIX),
+ (WITHDRAWN, 'Withdrawn', CVE_NOT_VULNERABLE,VI_NOT_VULNERABLE,VI_CLOSED),
+ (REJECTED, 'Rejected', CVE_NOT_VULNERABLE,VI_NOT_VULNERABLE,VI_CLOSED),
+ (DUPLICATE, 'Duplicate', CVE_NOT_VULNERABLE,VI_NOT_VULNERABLE,VI_CLOSED),
+ (NOT_APPLICABLE, 'Not Applicable', CVE_NOT_VULNERABLE,VI_NOT_VULNERABLE,VI_CLOSED),
+ (REPLACED_BY_REQUIREMENT, 'Replaced By Requirement',CVE_VULNERABLE,VI_VULNERABLE,VI_CLOSED),
+ (CANNOT_REPRODUCE, 'Cannot Reproduce', CVE_NOT_VULNERABLE,VI_NOT_VULNERABLE,VI_CLOSED),
+ (DONE, 'Done', CVE_VULNERABLE,VI_VULNERABLE,VI_CLOSED),
+ )
+ for i in range(len(Resolution)):
+ if r == Resolution[i][1]:
+ return Resolution[i][0],Resolution[i][2],Resolution[i][3],Resolution[i][4]
+ print("ERROR: unknown resolution string '%s=%s'" % (j,r))
+ log.write("ERROR: unknown resolution string '%s=%s'" % (j,r))
+ return 0,0,0,0
+
+#handles updating a list of issues for a single product/project
+#DOES NOT CALL COMMIT (should change this?)
+def update_project_issues(project, issues, conn, log):
+ global force_update
+
+ PRODUCT_ID = 0
+ PRODUCT_NAME = 1
+ PRODUCT_VERSION = 2
+ PRODUCT_PROFILE = 3
+ PRODUCT_PREFIX = 6
+
+ #CREATE TABLE "orm_defect" (
+ #0 "id" integer NOT NULL PRIMARY KEY AUTOINCREMENT
+ #1 "name" varchar(50) NOT NULL
+ #2 "summary" text NOT NULL
+ #3 "url" text NOT NULL
+ #4 "priority" integer NOT NULL
+ #5 "status" integer NOT NULL
+ #6 "resolution" integer NOT NULL
+ #7 "publish" text NOT NULL
+ #8 "release_version" varchar(50) NOT NULL
+ #9 "product_id" integer NULL REFERENCES "orm_product" ("id")
+ #10 "date_created" varchar(50) NOT NULL
+ #11 "date_updated" varchar(50) NOT NULL);
+
+ # ORM record indexes
+ DEFECT_ID = 0
+ DEFECT_DATE_UPDATED = 10
+ ID = 0
+ NAME = 1
+ CVE_DESCRIPTION = 13
+ CV_V_ID = 1
+ CV_C_ID = 2
+ I_VULNERABILITY_ID = 2
+ I_PRODUCT_ID = 3
+
+ USER_SRTOOL_ID = "SRTool"
+
+ PUBLISHED_FIELD = 'customfield_10010'
+ FIX_VERSION_FIELD = 'customfield_11002'
+
+ d = Defect()
+ d.project = project[PRODUCT_NAME] + " " + project[PRODUCT_VERSION] + " " + project[PRODUCT_PROFILE]
+ d.product_id = project[PRODUCT_ID]
+
+ cve_regex = re.compile("CVE-\d+-\d+")
+
+ c = conn.cursor()
+ d_cursor = conn.cursor()
+ for i,issue in enumerate(issues):
+
+ if get_override('SRTDBG_MINIMAL_DB') and (i > 10):
+ break
+
+ ### TODO: fill in values from defect database record
+ #d.name = ...
+ #d.date_updated = ...
+ #d.date_created = ...
+ #d.summary = ...
+ #d.url = ...
+ #d.priority = ...
+ #d.status = ...
+ #d.resolution,d.cve_status,d.vi_status,d.vi_outcome = translate_resolution(d.name, ...)
+ #d.publish = ...
+ #d.release_version = ...
+
+ sql = "SELECT * FROM orm_defect WHERE name='%s'" % d.name
+ defect = c.execute(sql).fetchone()
+
+ #if defect does not exists then create it, if defect is out of date then update the database record, else ignore
+ if defect is None:
+ log.write("\tINSERTING %s\n" % d.name)
+ sql = '''INSERT INTO orm_defect (name, summary, url, priority, status, resolution, publish, release_version, product_id, date_created, date_updated) VALUES (?,?,?,?,?,?,?,?,?,?,?)'''
+ c.execute(sql, (d.name, d.summary, d.url, d.priority, d.status, d.resolution, str(d.publish), d.release_version, d.product_id, d.date_created, d.date_updated))
+ # Get the new id
+ sql = "SELECT * FROM orm_defect WHERE name='%s'" % d.name
+ defect = c.execute(sql).fetchone()
+ defect_id = defect[DEFECT_ID]
+ elif force_update or (d.date_updated > defect[DEFECT_DATE_UPDATED]):
+ log.write("\tUPDATING %s\n" % d.name)
+ sql = '''UPDATE orm_defect SET summary=?, priority=?, status=?, resolution=?, publish=?, release_version=?, date_updated=? WHERE id = ?'''
+ c.execute(sql, (d.summary, d.priority, d.status, d.resolution, d.publish, d.release_version, d.date_updated, defect[DEFECT_ID]))
+ defect_id = defect[DEFECT_ID]
+ else:
+ log.write("\tSKIPPING %s\n" % d.name)
+ continue
+
+ #
+ # Update CVE -> Vulnerability -> Investigation -> this Defect chain
+ #
+
+ # V/I severity and status minimum from defect
+ # Add audit lines
+
+ # Find parent CVE
+ m = cve_regex.search(d.summary)
+ if m:
+ cve_name = m.group(0)
+ else:
+ print("WARNING: Missing CVE in defect name '%s'" % (d.summary))
+ continue
+ sql = "SELECT * FROM orm_cve WHERE name='%s'" % cve_name
+ cve = c.execute(sql).fetchone()
+ if not cve:
+ # create the placeholder CVE
+ log.write("\tINSERTING CVE for %s\n" % cve_name)
+ print("INSERTING CVE for %s,%s" % (cve_name,d.name))
+ sql = ''' INSERT into orm_cve (name, source, priority, status, comments, comments_private, cve_data_type, cve_data_format, cve_data_version, public, publish_state, publish_date, description, publishedDate, lastModifiedDate, recommend, recommend_list, cpe_list, cvssV3_baseScore, cvssV3_baseSeverity, cvssV3_vectorString, cvssV3_exploitabilityScore, cvssV3_impactScore, cvssV3_attackVector, cvssV3_attackComplexity, cvssV3_privilegesRequired, cvssV3_userInteraction, cvssV3_scope, cvssV3_confidentialityImpact, cvssV3_integrityImpact, cvssV3_availabilityImpact, cvssV2_baseScore, cvssV2_severity, cvssV2_vectorString, cvssV2_exploitabilityScore, cvssV2_impactScore, cvssV2_accessVector, cvssV2_accessComplexity, cvssV2_authentication, cvssV2_confidentialityImpact, cvssV2_integrityImpact)
+ VALUES (?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?)'''
+ c.execute(sql, (cve_name, '', d.priority, cve_status, '', '', '', '', '', 1, 0, '', 'Created from defect %s' % d.name, '', '', 0, '', '',
+ '','','','','','','','','','','','','','','','','','','','','','',''))
+ # Find the new id
+ print("FINDING CVE ID for %s\n" % cve_name)
+ c.execute("SELECT * FROM orm_cve where name = '%s'" % cve_name)
+ cve = c.fetchone()
+ c_id = cve[ID]
+ # Also create CVE history entry
+ sql = '''INSERT INTO orm_cvehistory (cve_id, comment, date, author) VALUES (?,?,?,?)'''
+ c.execute(sql, (c_id,'Created from defect %s' % d.name,srtool_today,USER_SRTOOL_ID))
+# sleep(0.1)
+ else:
+ c_id = cve[ID]
+
+ # Find CVE's vulnerability, else create
+ d_cursor.execute("SELECT * FROM orm_cvetovulnerablility where cve_id = '%s'" % c_id)
+ c2v = d_cursor.fetchone()
+ if not c2v:
+ # Create Vulnerability
+ v_name = new_vulnerability_name(d_cursor)
+ log.write("\tINSERTING VULNERABILITY %s for %s\n" % (v_name,cve_name))
+ print("INSERTING VULNERABILITY for (%s,%s)" % (cve_name,v_name))
+ sql = '''INSERT INTO orm_vulnerability (name,description,cve_primary_name,public,comments,comments_private,status,outcome,severity) VALUES (?,?,?,?,?,?,?,?,?)'''
+ c.execute(sql, (v_name, cve[CVE_DESCRIPTION], cve_name, True, 'Created from defect %s' % d.name, '', vi_status, vi_outcome ,d.priority))
+ # Find the new id
+ d_cursor.execute("SELECT * FROM orm_vulnerability where name = '%s'" % v_name)
+ v = d_cursor.fetchone()
+ v_id = v[ID]
+ # Also create CVE to Vulnerability
+ sql = '''INSERT INTO orm_cvetovulnerablility (vulnerability_id, cve_id) VALUES (?,?)'''
+ c.execute(sql, (v_id,c_id))
+ # Also create Vulnerability history entry
+ sql = '''INSERT INTO orm_vulnerabilityhistory (vulnerability_id, comment, date, author) VALUES (?,?,?,?)'''
+ c.execute(sql, (v_id,'Created from defect %s' % d.name,srtool_today,USER_SRTOOL_ID))
+# sleep(0.1)
+ else:
+ print("FOUND VULNERABILITY ID for %s" % (cve_name))
+ v_id = c2v[CV_V_ID]
+
+ # Find CVE's investigation, else create
+ sql = "SELECT * FROM orm_investigation where vulnerability_id = '%s' AND product_id = '%s';" % (v_id,d.product_id)
+ print("I_TEST:%s" % sql)
+ d_cursor.execute(sql)
+ investigation = d_cursor.fetchone()
+ if not investigation:
+ # Create Investigation
+ i_name = new_investigation_name(d_cursor)
+ log.write("\tINSERTING INVESTIGATION for %s\n" % cve_name)
+ print("INSERTING INVESTIGATION for %s,%s" % (i_name,d.name))
+ sql = '''INSERT INTO orm_investigation (name,vulnerability_id,product_id,public,comments,comments_private,status,outcome,severity) VALUES (?,?,?,?,?,?,?,?,?)'''
+ c.execute(sql, (i_name, v_id, d.product_id, True, 'Created from defect %s' % d.name, '', vi_status, vi_outcome, d.priority))
+ # Find the new id
+ d_cursor.execute("SELECT * FROM orm_investigation where name = '%s'" % i_name)
+ investigation = d_cursor.fetchone()
+ i_id = investigation[ID]
+ # Also create Investigation to Vulnerability
+ AFFECTED = 0
+ sql = '''INSERT INTO orm_vulnerabilityproduct (vulnerability_id, investigation_id, product_id, relation) VALUES (?,?,?,?)'''
+ c.execute(sql, (v_id,i_id,d.product_id,AFFECTED))
+ # Also create Investigation history entry
+ sql = '''INSERT INTO orm_investigationhistory (investigation_id, comment, date, author) VALUES (?,?,?,?)'''
+ c.execute(sql, (i_id,'Created from defect %s' % d.name,srtool_today,USER_SRTOOL_ID))
+# sleep(0.1)
+ else:
+ print("FOUND INVESTIGATION ID for %s" % (cve_name))
+ i_id = investigation[ID]
+
+ # Add this defect to the investigation
+ d_cursor.execute("SELECT * FROM orm_investigationtodefect where investigation_id = '%s' and product_id = '%s' and defect_id = '%s'" % (i_id,d.product_id,defect_id))
+ i2d = d_cursor.fetchone()
+ if not i2d:
+ # Create Investigation
+ i_name = new_investigation_name(d_cursor)
+ log.write("\tINSERTING INVESTIGATION to DEFECT for %s\n" % i_name)
+ sql = '''INSERT INTO orm_investigationtodefect (investigation_id, product_id, defect_id) VALUES (?,?,?)'''
+ c.execute(sql, (i_id,d.product_id,defect_id))
+# sleep(0.1)
+
+ #print("=========================================================================================\n")
+ #print("\n")
+ c.close()
+
+
+#################################
+# Add defect record summary to SRTool defect table
+#
+
+def add_to_defect_db(defect_name):
+ defect_name = defect_name.strip().upper()
+
+ #try connecting to defect database
+ try:
+ ### TODO: open connection to defect database
+ # defect_db = ...
+ conn = sqlite3.connect(srtDbName)
+ c = conn.cursor()
+ except Exception as e:
+ print("xhr_investigation_commit:CONNECTION TO DATABASE FAILED:(%s)\n" % e, file=sys.stderr)
+ return 1
+
+ srtool_today = datetime.today().strftime('%Y-%m-%d')
+
+ #Import the issue into the SRTool
+ try:
+ ### TODO: read defect record from defect database
+ # issue = ...
+ pass
+ except Exception as e:
+ print("ERROR:key '%s' does not exist(%s)" % (defect_name,e), file=sys.stderr)
+ return 1
+
+ d = Defect()
+ try:
+ ### TODO: fill in values from defect database record
+ d.name = defect_name
+ d.date_updated = srtool_today # ...
+ d.date_created = srtool_today # ...
+ d.summary = 'temp defect record' # ...
+ #d.url = ...
+ d.priority = translate_priority(d.name,'P3') # ...
+ d.status = translate_status(d.name,'Open') # ...
+ d.resolution,d.cve_status,d.vi_status,d.vi_outcome = translate_resolution(d.name,'Unresolved') # ...
+ #d.publish = ...
+ #d.release_version = ...
+
+ # Get the product ID
+ PRODUCT_ID = 0
+ PRODUCT_NAME = 1
+ PRODUCT_VERSION = 2
+ PRODUCT_PROFILE = 3
+ PRODUCT_PREFIX = 6
+ products = c.execute('''SELECT * FROM orm_product''').fetchall()
+ d.product_id = 1
+ for product in products:
+ if d.name.startswith(product[PRODUCT_PREFIX]):
+ d.product_id = product[PRODUCT_ID]
+ break
+
+ #log.write("\tINSERTING %s\n" % d.name)
+ sql = '''INSERT INTO orm_defect (name, summary, url, priority, status, resolution, publish, release_version, product_id, date_created, date_updated) VALUES (?,?,?,?,?,?,?,?,?,?,?)'''
+ c.execute(sql, (d.name, d.summary, d.url, d.priority, d.status, d.resolution, str(d.publish), d.release_version, d.product_id, d.date_created, d.date_updated))
+ conn.commit()
+ c.close()
+ conn.close()
+ except Exception as e:
+ print("ERROR:could not find/import defect(%s)" % e, file=sys.stderr)
+ return 1
+
+#################################
+# main loop
+#
+
+def main(argv):
+ global force_update
+
+ parser = argparse.ArgumentParser(description='srtool_defect.py: manage the SRTool defect database')
+ parser.add_argument('--update', '-U', action='store_const', const='update', dest='command', help='Import defect states and update SRTool defect table')
+ parser.add_argument('--force', '-f', action='store_true', dest='force_update', help='Force updates')
+ parser.add_argument('--add', nargs=1, help='Add an existing defect to SRTool defect database')
+
+ args = parser.parse_args()
+
+ master_log = open("./update_logs/master_log.txt", "a")
+
+ force_update = False
+ if None != args.force_update:
+ force_update = args.force_update
+
+ if args.add:
+ add_to_defect_db(args.add[0])
+ elif 'update' == args.command:
+ try:
+ print("BEGINNING DEFECT UPDATES PLEASE WAIT ... this can take some time")
+ update()
+ master_log.write("SRTOOL:%s:DEFECT TABLE & DEFECT ISSUES:\t\t\t...\t\t\tUPDATED\n" % (date.today()))
+ print("DATABASE UPDATE FINISHED\n")
+ except Exception as e:
+ master_log.write("SRTOOL:%s:DEFECT TABLE & DEFECT ISSUES:\t\t\t...\t\t\tFAILED ... %s\n" % (date.today(), e))
+ print("DATABASE UPDATES FAILED ... %s" % e)
+ else:
+ print("Command not found")
+
+if __name__ == '__main__':
+ global script_pathname
+
+ # fetch any environment overrides
+ set_override('SRTDBG_MINIMAL_DB')
+ set_override('SRTDBG_SKIP_DEFECT_IMPORT')
+ if get_override('SRTDBG_SKIP_DEFECT_IMPORT'):
+ exit(0)
+
+ script_pathname=os.path.dirname(sys.argv[0])
+ main(sys.argv[1:])
diff --git a/bin/srtool_utils.py b/bin/srtool_utils.py
new file mode 100755
index 00000000..68789615
--- /dev/null
+++ b/bin/srtool_utils.py
@@ -0,0 +1,435 @@
+#!/usr/bin/env python3
+#
+# ex:ts=4:sw=4:sts=4:et
+# -*- tab-width: 4; c-basic-offset: 4; indent-tabs-mode: nil -*-
+#
+# Security Response Tool Commandline Tool
+#
+# Copyright (C) 2018 Wind River Systems
+#
+# This program is free software; you can redistribute it and/or modify
+# it under the terms of the GNU General Public License version 2 as
+# published by the Free Software Foundation.
+#
+# This program is distributed in the hope that it will be useful,
+# but WITHOUT ANY WARRANTY; without even the implied warranty of
+# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+# GNU General Public License for more details.
+#
+# You should have received a copy of the GNU General Public License along
+# with this program; if not, write to the Free Software Foundation, Inc.,
+# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
+
+### Usage Examples (run from top level directory)
+# ./bin/srtool_utils.py -B ... backs up essential parts of database to json file
+# ./bin/srtool_utils.py -R weeknum daynum ... restores database from backups. ASSUMES DATABASE EXISTS AND INITIALLY POPULATED FROM DATASOURCES
+
+### How-To:
+# Adding whole table to backup
+# 1. Modify WHOLE_TABLES list to contain name of table
+# Backing subset of table's columns (ex. only want to save name of CVE record instead of everything...)
+# 1. Modify SUBSET_TABLES to contain (table_name, effective_primary_key) tuple where effective_primary_key can be used to uniquely identify the record
+# 2. Create helper method that returns list of json dictionaries where each dictionary is a record (look at encode_cve_to_json() and encode_user_to_json() for examples)
+# - dict_factory() and setting conn.row_factory = dict_factory are VERY helpful (essential?)
+# 3. Call the helper method from inside backup_db_json()
+# - be sure save the dictionary it returns to db['your_table_name']
+
+### Misc Notes
+# When restoring database, must start from scratch or else "unique id contraint error" will be thrown by SQL. Can use simulate_corruption() to enter scratch state -- USE WITH CAUTION
+
+
+import os
+import sys
+import re
+import csv
+import xml.etree.ElementTree as ET
+import argparse
+import sqlite3
+import subprocess
+import json
+import urllib
+
+try:
+ from datetime import datetime, date
+ from pprint import pprint
+ from urllib.request import urlopen, URLError
+ from urllib.parse import urlparse
+except ImportError:
+ from urllib2 import urlopen, URLError
+ from urlparse import urlparse
+
+# setup
+lookupTable = []
+cveIndex = {}
+db_change = False
+is_verbose = False
+
+srtDbName = 'srt.sqlite'
+WHOLE_TABLES = ['orm_cvehistory', 'orm_cpetable', 'orm_cpetocve', 'orm_cpefilter', 'orm_cvetocwe', 'orm_cvereference', 'orm_vulnerability', 'orm_vulnerabilitycomments',
+ 'orm_vulnerabilityhistory', 'orm_vulnerabilityuploads', 'orm_cvetovulnerablility', 'orm_investigation', 'orm_investigationtodefect', 'orm_investigationcomments', 'orm_investigationhistory',
+ 'orm_investigationuploads', 'orm_vulnerabilityproduct', 'orm_vulnerabilityaccess', 'orm_vulnerabilitynotification', 'orm_investigationaccess', 'orm_investigationnotification']
+
+
+SUBSET_TABLES = [('orm_cve', 'name'), ('orm_user', 'name')] #(table_name, effective_primary_key)
+
+
+#################################
+# reset sources
+#
+
+# source_data = (source_id)
+def commit_to_source(conn, source_data):
+ sql = ''' UPDATE orm_datasource
+ SET loaded = ?
+ WHERE id = ?'''
+ cur = conn.cursor()
+ print("UPDATE_SCORE:%s" % str(source_data))
+ cur.execute(sql, source_data)
+
+def sources(cmnd):
+ DS_ID = 0
+ DS_DATA = 1
+ DS_SOURCE = 2
+ DS_TYPE = 3
+ DS_DESCRIPTION = 4
+ DS_FILE_PATH = 5
+ DS_URL = 6
+ DS_LOADED = 7
+ DS_META_URL = 8
+ DS_LAST_MODIFIED_DATE = 9
+
+ conn = sqlite3.connect(srtDbName)
+ c = conn.cursor()
+
+ print('Sources(%s)' % cmnd)
+
+ c.execute("SELECT * FROM orm_datasource")
+ is_change = False
+ for ds in c:
+ if 'set' == cmnd:
+ commit_to_source(conn,(True,ds[DS_ID]))
+ is_change = True
+ elif 'reset' == cmnd:
+ commit_to_source(conn,(False,ds[DS_ID]))
+ is_change = True
+ elif 'reset_not_nist' == cmnd:
+ if 'nist' != ds[DS_SOURCE]:
+ print("RESETTING Data source [%s] data='%s' of '%s' load state from '%s' is '%s'" % (ds[DS_ID],ds[DS_DATA],ds[DS_DESCRIPTION],ds[DS_SOURCE],ds[DS_LOADED]))
+ commit_to_source(conn,(False,ds[DS_ID]))
+ else:
+ commit_to_source(conn,(True,ds[DS_ID]))
+ is_change = True
+ elif 'triage_keywords' == cmnd:
+ if 'triage_keywords' == ds[DS_DATA]:
+ print("RESETTING Data source [%s] data='%s' of '%s' load state from '%s' is '%s'" % (ds[DS_ID],ds[DS_DATA],ds[DS_DESCRIPTION],ds[DS_SOURCE],ds[DS_LOADED]))
+ commit_to_source(conn,(False,ds[DS_ID]))
+ is_change = True
+ else:
+ print("Data source [%s] data='%s' of '%s' load state from '%s' is '%s'" % (ds[DS_ID],ds[DS_DATA],ds[DS_DESCRIPTION],ds[DS_SOURCE],ds[DS_LOADED]))
+
+ if is_change:
+ conn.commit()
+
+
+def settings():
+ global is_verbose
+ global csvfile_name
+ global keywords_for
+ global keywords_against
+
+ read_keywords(csvfile_name)
+
+ conn = sqlite3.connect(srtDbName)
+ c = conn.cursor()
+
+ SETTING_ID = 0
+ SETTING_NAME = 1
+ SETTING_HELP = 2
+ SETTING_VALUE = 3
+
+ # Scan the CVEs
+ c.execute("SELECT * FROM orm_srtsetting")
+
+ index = 0
+ count = 0
+ is_change = False
+ for setting in c:
+ print("Setting[%s] = '%s'" % (setting[SETTING_NAME], setting[SETTING_VALUE][0:40]))
+
+ # Scan the CVEs
+ c.execute("SELECT * FROM orm_srtsetting where name = '%s'" % 'keywords_for')
+
+ setting = c.fetchone()
+ print("Setting2[%s] = '%s'" % (setting[SETTING_NAME], setting[SETTING_VALUE].split('|')[0]))
+
+
+
+#################################
+# encode entire database to a json file and export the file
+#
+def backup_db_json(is_daily):
+ conn = sqlite3.connect(srtDbName)
+ conn.row_factory = dict_factory
+ cur = conn.cursor()
+ today = datetime.today()
+ weeknum = today.strftime("%W")
+ weekday = today.isoweekday()
+
+ if is_daily:
+ backup = open(os.path.join(script_pathname, "backups/backup_%s.json" % (weekday)), "w")
+ else:
+ backup = open(os.path.join(script_pathname, "backups/backup_%s_%s.json" % (weeknum, weekday)), "w")
+ db = {}
+
+ #encoding whole tables
+ for table in WHOLE_TABLES:
+ print('[STORING]\t%s\n' % table, end='', flush=True)
+ cur.execute("SELECT * FROM %s" % table)
+ db[table] = cur.fetchall()
+ print()
+
+ #encoding SUBSET_TABLES
+ db['orm_cve'] = encode_cve_to_json()
+ db['orm_user'] = encode_user_to_json()
+
+ json.dump(db, backup)
+ print()
+ backup.close()
+ conn.close()
+
+#Helper for encoding table to json
+def dict_factory(cursor, row):
+ d = {}
+ for idx, col in enumerate(cursor.description):
+ d[col[0]] = row[idx]
+ return d
+
+#encodes subset of ORM_CVE table's records to json
+#returns array for dictionaries (one dict for each record)
+def encode_cve_to_json():
+ import gc
+ conn = sqlite3.connect(srtDbName)
+ conn.row_factory = dict_factory
+ cur = conn.cursor()
+
+ TABLE_NAME = 'orm_cve'
+ toReturn = []
+ subset_keys = ('name', 'source', 'status', 'comments', 'comments_private', 'public', 'publish_state', 'publish_date')
+
+ print('[STORING]\torm_cve\n', end='', flush=True)
+
+ sql = "SELECT %s FROM %s" % (str(subset_keys).replace('\'', '')[1:-1], TABLE_NAME)
+ records = cur.execute(sql).fetchall()
+ for i, record in enumerate(records):
+ if (i / 3500 == 0):
+ gc.collect()
+ source = record['source']
+ if (source != "srt"):
+ subset_dict = {key: None for key in subset_keys}
+ for key in subset_keys:
+ subset_dict[key] = record[key]
+ toReturn.append(subset_dict)
+ else:
+ toReturn.append(record)
+
+ conn.close()
+ return toReturn
+
+#encodes subset of ORM_USER table's records to json
+#returns array for dictionaries (one dict for each record)
+def encode_user_to_json():
+ conn = sqlite3.connect(srtDbName)
+ conn.row_factory = dict_factory
+ cur = conn.cursor()
+
+ print('[STORING]\torm_user\n', end='', flush=True)
+
+ #everything but PASSWORD
+ subset_keys = ('name', 'email', 'role', 'access')
+ sql = "SELECT %s FROM %s" % (str(subset_keys).replace('\'', '')[1:-1], 'orm_user')
+ records = cur.execute(sql).fetchall()
+ conn.close()
+ return records
+
+#decodes the json file containing the encoded database backup
+def restore_db_json(weeknum, weekday):
+ import gc
+ conn = sqlite3.connect(srtDbName)
+ conn.row_factory = dict_factory
+ cur = conn.cursor()
+
+ backup = open(os.path.join(script_pathname, "backups/backup_%s_%s.json" % (weeknum, weekday)), "r")
+ db = json.load(backup)
+
+ spinner = [' ', '. ', '.. ', '...']
+
+ #decoding WHOLE_TABLES
+ for table in WHOLE_TABLES:
+ sql = "PRAGMA table_info(%s)" % table
+ table_schema = conn.execute(sql).fetchall()
+ total = len(db[table])
+ for i, dic in enumerate(db[table]):
+ if (i / 3500 == 0):
+ gc.collect()
+ print('[%4d]%30s\r' % ((i * 100) / total, table + spinner[i % 4]), end='\r', flush=True)
+ #print("Restoring %s" % table + spinner[i % 4], end='\r', flush=True)
+ record = []
+ for row in table_schema:
+ record.append(dic[row['name']])
+ #creating the specifc sql query
+ sql = "INSERT INTO %s VALUES (%s)" % (table, "?," * len(record))
+ sql = sql[:-2]
+ sql += ")"
+
+ cur.execute(sql, record)
+ print("Finished %s " % table, end='\n', flush=True)
+
+ for table, primary_key in SUBSET_TABLES:
+ total = len(db[table])
+ print(total)
+ for i, dic in enumerate(db[table]):
+ if (i / 3500 == 0):
+ gc.collect()
+ print('[%4d]%30s\r' % ((i * 100) / total, table + spinner[i % 4]), end='\r', flush=True)
+ #print("Inserting value %d" % i)
+ #print("Restoring %s" % table + spinner[i % 4], end='\r', flush=True)
+ #create sql query for updating subset of a record
+ "%s = ?," * len(dic)
+ sql = "UPDATE %s SET " % table
+ sql += "%s = ?," * len(dic) % tuple(dic)
+ sql = sql[:-1]
+ sql += " WHERE %s=?" % primary_key
+ #add primary key at the end for WHERE clause
+
+ temp = list(dic.values())
+ temp.append(dic[primary_key])
+
+ cur.execute(sql, temp)
+ conn.commit()
+ print("Finished %s " % table, end='\r', flush=True)
+ print(" " * 80, end='\r')
+ conn.commit()
+ conn.close()
+
+def run_all_updates():
+ DS_COMMAND = 12
+
+ conn = sqlite3.connect(srtDbName)
+ cur = conn.cursor()
+
+ cache_path = os.path.join(script_pathname, "data/cache")
+ for cached_cve in os.listdir(cache_path):
+ cve_path = os.path.join(cache_path, cached_cve)
+ try:
+ os.remove(cve_path)
+ except Exception as e:
+ print(e)
+
+ #get sources that have update command
+ sources = cur.execute("SELECT * FROM orm_datasource WHERE command IS NOT ''").fetchall()
+ for source in sources:
+ print("Update required\t...\texecuting %s\n" % (source[DS_COMMAND]))
+ os.system(os.path.join(script_pathname, source[DS_COMMAND]))
+
+ conn.commit()
+ conn.close()
+
+#time must be in '%H:%M:%S' format
+def configure_ds_update(datasource_description, frequency, time):
+ conn = sqlite3.connect(srtDbName)
+ cur = conn.cursor()
+
+ sql = "UPDATE orm_datasource SET update_frequency=?, update_time=? WHERE description=?"
+ cur.execute(sql, (frequency, time, datasource_description))
+
+ conn.commit()
+ conn.close()
+
+### TESTING PURPOSES ONLY
+# Simlutaes corrupting the database by clearing all WHOLE_TABLES and SUBSET_TABLES
+def simulate_corruption():
+ conn = sqlite3.connect(srtDbName)
+ cur = conn.cursor()
+ [cur.execute("DELETE FROM %s" % table) for table in WHOLE_TABLES]
+ #[cur.execute("DELETE FROM %s" % table[0]) for table in SUBSET_TABLES]
+ conn.commit()
+ conn.close()
+
+#################################
+# main loop
+#
+def main(argv):
+ # setup
+ parser = argparse.ArgumentParser(description='srtool.py: manage the SRTool database')
+ parser.add_argument('--sources', '-s', nargs='?', const='display', help='SRTool Sources')
+ parser.add_argument('--reset-sources', '-r', action='store_const', const='reset_sources', dest='command', help='Reset SRTool Sources')
+ parser.add_argument('--settings', '-S', action='store_const', const='settings', dest='command', help='Show the SRT Settings')
+ parser.add_argument('--backup-db-json', '-B', action='store_const', const='backup-json', dest='command', help='Converts the database to JSON files and saves as permanent archive')
+ parser.add_argument('--backup-db-json-daily', '-D', action='store_const', const='backup-json-daily', dest='command', help='Converts the database to JSON files and save on week day wheel')
+ parser.add_argument('--restore_db_json', '-R', nargs=2, help='Specify WEEKNUM the WEEKDAY to read specified json_backup and restore database to that version')
+ parser.add_argument('--simulate-corruption', '-C', action='store_const', const='simulate-corruption', dest='command')
+ parser.add_argument('--run-all-updates', '-U', action='store_const', const='run-all-updates', dest='command', help='updates all data sources')
+ parser.add_argument('--configure_ds_update', '-T', nargs=3, help='Set update frequency and time for specified datasource. Time must be in "%H:%M:%S" format. Check bin/README.txt for more info')
+
+ args = parser.parse_args()
+
+ master_log = open(os.path.join(script_pathname, "update_logs/master_log.txt"), "a")
+
+ if args.sources:
+ if args.sources.startswith('s'):
+ sources("set")
+ elif 0 <= args.sources.find('nist'):
+ sources("reset_not_nist")
+ elif args.sources.startswith('r'):
+ sources("reset")
+ elif args.sources.startswith('t'):
+ sources("triage_keywords")
+ else:
+ sources("display")
+ elif 'settings' == args.command:
+ settings()
+ elif ('backup-json' == args.command) or ('backup-json-daily' == args.command):
+ try:
+ backup_db_json('backup-json-daily' == args.command)
+ master_log.write("SRTOOL:%s:DATABASE BACKUP:\t\t\t\t...\t\t\tSUCCESS\n" % date.today())
+ print ("DATABASE BACKUP SUCCESSFUL\n")
+ except Exception as e:
+ print ("DATABASE BACKUP FAILED ... %s" % e)
+ master_log.write("SRTOOL:%s:DATABASE BACKUP:\t\t\t\t...\t\t\tFAILED ... %s\n" % (date.today(), e))
+ elif args.restore_db_json:
+ try:
+ restore_db_json(args.restore_db_json[0], args.restore_db_json[1])
+ master_log.write("SRTOOL:%s:DATABASE RESTORE:\t\t\t\t...\t\t\tSUCCESS ... RESTORED TO WEEK: %s DAY: %s\n" % (date.today(), args.restore_db_json[0], args.restore_db_json[1]))
+ print ("DATABASE RESTORE SUCCESSFUL\n")
+ except Exception as e:
+ print ("DATABASE RESTORE FAILED ... %s" % e)
+ master_log.write("SRTOOL:%s:DATABASE RESTORE:\t\t\t\t...\t\t\tFAILED ... %s\n" % (date.today(), e))
+ elif 'simulate-corruption' == args.command:
+ simulate_corruption()
+ master_log.write("SRTOOL:%s:PURPOSELY CORRUPTED DATABASE:\t\t\t...\t\t\tCORRUPTED\n" % (date.today()))
+ elif 'run-all-updates' == args.command:
+ try:
+ print("BEGINNING UPDATING ALL DATASOURCES... this WILL take a long time")
+ run_all_updates()
+ master_log.write("SRTOOL:%s:UPDATING ALL DATASOURCES:\t\t\t...\t\t\tSUCCESS\n" %(date.today()))
+ print("FINISHED UPDATING ALL DATASOURCES\n")
+ except Exception as e:
+ print("FAILED UPDATING ALL DATASOURCES")
+ master_log.write("SRTOOL:%s:UPDATING ALL DATASOURCES\t\t\t...\t\t\tFAILED ... %s\n" (date.today(), e))
+ elif args.configure_ds_update:
+ try:
+ print("CHANGING UPDATE CONFIGURATION FOR %s" % args.configure_ds_update[0])
+ configure_ds_update(args.configure_ds_update[0], args.configure_ds_update[1], args.configure_ds_update[2])
+ master_log.write("SRTOOL:%s:%s\t\t\t...\t\t\tCONFIGURED" % (date.today(), args.configure_ds_update[0]))
+ except Exception as e:
+ print("FAILED TO CONFIGURE UPDATE SETTINGS FOR %s" % args.configure_ds_update[0])
+ master_log.write("SRTOOL:%s:%s\t\t\t...\t\t\tFAILED ... %s" % (date.today(), args.configure_ds_update[0], e))
+ else:
+ print("Command not found")
+ master_log.close()
+
+if __name__ == '__main__':
+ global script_pathname
+ from os.path import abspath
+ script_pathname = os.path.abspath(os.path.dirname(os.path.dirname(sys.argv[0])))
+ main(sys.argv[1:])
diff --git a/data/nvdcve-1.0-2017.json b/data/nvdcve-1.0-2017.json
deleted file mode 100755
index 21d47413..00000000
--- a/data/nvdcve-1.0-2017.json
+++ /dev/null
@@ -1,1807691 +0,0 @@
-{
- "CVE_data_type" : "CVE",
- "CVE_data_format" : "MITRE",
- "CVE_data_version" : "4.0",
- "CVE_data_numberOfCVEs" : "9741",
- "CVE_data_timestamp" : "2017-11-27T08:04Z",
- "CVE_Items" : [ {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0001"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96057"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0001"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka \"Windows GDI Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0005, CVE-2017-0025, and CVE-2017-0047."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0002"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://technet.microsoft.com/security/bulletin/MS17-001"
- }, {
- "url" : "http://www.securityfocus.com/bid/95284"
- }, {
- "url" : "http://www.securitytracker.com/id/1037573"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Edge allows remote attackers to bypass the Same Origin Policy via vectors involving the about:blank URL and data: URLs, aka \"Microsoft Edge Elevation of Privilege Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:P/A:P)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 6.8
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 6.4,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-01-10T21:59Z",
- "lastModifiedDate" : "2017-01-18T02:59Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0003"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "sharepoint_enterprise_server",
- "version" : {
- "version_data" : [ {
- "version_value" : "2016"
- } ]
- }
- }, {
- "product_name" : "word",
- "version" : {
- "version_data" : [ {
- "version_value" : "2016"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://fortiguard.com/advisory/FG-VD-16-079"
- }, {
- "url" : "http://technet.microsoft.com/security/bulletin/MS17-002"
- }, {
- "url" : "http://www.securityfocus.com/bid/95287"
- }, {
- "url" : "http://www.securitytracker.com/id/1037568"
- }, {
- "url" : "http://www.securitytracker.com/id/1037569"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Word 2016 and SharePoint Enterprise Server 2016 allow remote attackers to execute arbitrary code via a crafted document, aka \"Microsoft Office Memory Corruption Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:sharepoint_enterprise_server:2016",
- "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2016",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-01-10T21:59Z",
- "lastModifiedDate" : "2017-03-16T01:59Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0004"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://technet.microsoft.com/security/bulletin/MS17-004"
- }, {
- "url" : "http://www.securityfocus.com/bid/95318"
- }, {
- "url" : "http://www.securitytracker.com/id/1037571"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Local Security Authority Subsystem Service (LSASS) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to cause a denial of service (reboot) via a crafted authentication request, aka \"Local Security Authority Subsystem Service Denial of Service Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7:-:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 3.9,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:L/Au:N/C:N/I:N/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.8
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 10.0,
- "impactScore" : 6.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-01-10T21:59Z",
- "lastModifiedDate" : "2017-01-18T02:59Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0005"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96033"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://blogs.technet.microsoft.com/mmpc/2017/03/27/detecting-and-mitigating-elevation-of-privilege-exploit-for-cve-2017-0005/"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0005"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka \"Windows GDI Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0025, and CVE-2017-0047."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.0,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 6.9
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 3.4,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0006"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "excel",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- } ]
- }
- }, {
- "product_name" : "excel_viewer",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "office_compatibility_pack",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "sharepoint_server",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96740"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0006"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Excel 2007 SP3, Office Compatibility Pack SP3, Excel Viewer, and Excel Services on SharePoint Server 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka \"Microsoft Office Memory Corruption Vulnerability.\" This vulnerability is different from those described in CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel_viewer",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_compatibility_pack::sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:sharepoint_server:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0007"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96018"
- }, {
- "url" : "http://www.securitytracker.com/id/1038001"
- }, {
- "url" : "https://enigma0x3.net/2017/04/03/defeating-device-guard-a-look-into-cve-2017-0007/"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0007"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Device Guard in Microsoft Windows 10 Gold, 1511, 1607, and Windows Server 2016 allows remote attackers to modify PowerShell script without invalidating associated signatures, aka \"PowerShell Security Feature Bypass Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "NONE",
- "baseScore" : 5.5,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:N/I:P/A:N)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 2.1
- },
- "severity" : "LOW",
- "exploitabilityScore" : 3.9,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0008"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "9"
- }, {
- "version_value" : "10"
- }, {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96073"
- }, {
- "url" : "http://www.securitytracker.com/id/1038008"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0008"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Internet Explorer Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0009 and CVE-2017-0059."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:9",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:10",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0009"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "9"
- }, {
- "version_value" : "10"
- }, {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.security-assessment.com/files/documents/advisory/comparestring_infoleak.pdf"
- }, {
- "url" : "http://www.securityfocus.com/bid/96077"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0009"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Microsoft Browser Memory Corruption Vulnerability.\" This vulnerability is different from those described in CVE-2017-0011, CVE-2017-0017, CVE-2017-0065, and CVE-2017-0068."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:9",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:10",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0010"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96059"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0010"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "AND",
- "children" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
- } ]
- }, {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0011"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96064"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0011"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Edge allows remote attackers to obtain sensitive information via a crafted web site, aka \"Microsoft Edge Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0017, CVE-2017-0065, and CVE-2017-0068."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0012"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96085"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0012"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to spoof web content via a crafted web site, aka \"Microsoft Browser Spoofing Vulnerability.\" This vulnerability is different from those described in CVE-2017-0033 and CVE-2017-0069."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "LOW",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:P/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0014"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "office",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-284"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96013"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0014"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Windows Graphics Component in Microsoft Office 2010 SP2; Windows Server 2008 R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Windows Graphics Component Remote Code Execution Vulnerability.\" This vulnerability is different from that described in CVE-2017-0108."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0015"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96079"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0015"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "AND",
- "children" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
- } ]
- }, {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- } ]
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0016"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-476"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/95969"
- }, {
- "url" : "http://www.securitytracker.com/id/1037767"
- }, {
- "url" : "http://www.securitytracker.com/id/1038001"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0016"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Windows 10 Gold, 1511, and 1607; Windows 8.1; Windows RT 8.1; Windows Server 2012 R2, and Windows Server 2016 do not properly handle certain requests in SMBv2 and SMBv3 packets, which allows remote attackers to execute arbitrary code via a crafted SMBv2 or SMBv3 packet to the Server service, aka \"SMBv2/SMBv3 Null Dereference Denial of Service Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "HIGH",
- "baseScore" : 5.9,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.2,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:N/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.1
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 6.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-25T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0017"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-79"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96078"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0017"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The RegEx class in the XSS filter in Microsoft Edge allows remote attackers to conduct cross-site scripting (XSS) attacks and obtain sensitive information via unspecified vectors, aka \"Microsoft Edge Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0011, CVE-2017-0065, and CVE-2017-0068."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "CHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "LOW",
- "availabilityImpact" : "NONE",
- "baseScore" : 6.1,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 2.7
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:P/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0018"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "10"
- }, {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96086"
- }, {
- "url" : "http://www.securitytracker.com/id/1038008"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0018"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Internet Explorer 10 and 11 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Internet Explorer Memory Corruption Vulnerability.\" This vulnerability is different from those described in CVE-2017-0037 and CVE-2017-0149."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:10",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0019"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "word",
- "version" : {
- "version_data" : [ {
- "version_value" : "2016"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96042"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0019"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Word 2016 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka \"Microsoft Office Memory Corruption Vulnerability.\" This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2016",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0020"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "excel",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- }, {
- "version_value" : "2013"
- }, {
- "version_value" : "2016"
- } ]
- }
- }, {
- "product_name" : "office_web_apps",
- "version" : {
- "version_data" : [ {
- "version_value" : "2013"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96050"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0020"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Excel 2016, Excel 2010 SP2, Excel 2013 RT SP1, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka \"Microsoft Office Memory Corruption Vulnerability.\" This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0030, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel:2013:sp1:~~rt~~~",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel:2016",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_web_apps:2013:sp1",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0021"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-284"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96020"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0021"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows 10 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka \"Hyper-V System Data Structure Vulnerability.\" This vulnerability is different from that described in CVE-2017-0095."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 9.0,
- "baseSeverity" : "CRITICAL"
- },
- "exploitabilityScore" : 2.3,
- "impactScore" : 6.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:L/Au:S/C:C/I:C/A:C)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "LOW",
- "authentication" : "SINGLE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.7
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 5.1,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0022"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96069"
- }, {
- "url" : "http://www.securitytracker.com/id/1038014"
- }, {
- "url" : "https://0patch.blogspot.com/2017/09/exploit-kit-rendezvous-and-cve-2017-0022.html"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0022"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft XML Core Services (MSXML) in Windows 10 Gold, 1511, and 1607; Windows 7 SP1; Windows 8.1; Windows RT 8.1; Windows Server 2008 SP2 and R2 SP1; Windows Server 2012 Gold and R2; Windows Server 2016; and Windows Vista SP2 improperly handles objects in memory, allowing attackers to test for files on disk via a crafted web site, aka \"Microsoft XML Information Disclosure Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-09-28T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0023"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96075"
- }, {
- "url" : "http://www.securitytracker.com/id/1037989"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0023"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The PDF library in Microsoft Edge; Windows 8.1; Windows Server 2012 and R2; Windows RT 8.1; and Windows 10, 1511, and 1607 allows remote attackers to execute arbitrary code via a crafted PDF file, aka \"Microsoft PDF Remote Code Execution Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0024"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96029"
- }, {
- "url" : "http://www.securitytracker.com/id/1038017"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0024"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Microsoft Windows 10 1607 and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, and CVE-2017-0082."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0025"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96626"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0025"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Microsoft Windows Vista; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0005, and CVE-2017-0047."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0026"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96032"
- }, {
- "url" : "http://www.securitytracker.com/id/1038017"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0026"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, and CVE-2017-0082."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0027"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "excel",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- }, {
- "version_value" : "2010"
- }, {
- "version_value" : "2013"
- }, {
- "version_value" : "2016"
- } ]
- }
- }, {
- "product_name" : "office_compatibility_pack",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "sharepoint_server",
- "version" : {
- "version_data" : [ {
- "version_value" : "2013"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96043"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0027"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, and Excel Services on SharePoint Server 2013 SP1 allow remote attackers to obtain sensitive information from process memory via a crafted Office document, aka \"Microsoft Office Information Disclosure Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel:2010:sp2:~~~~x64~",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel:2013:sp1:~~rt~~~",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel:2016",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_compatibility_pack::sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:sharepoint_server:2013:sp1",
- "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
- "attackVector" : "LOCAL",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.7,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 2.6
- },
- "severity" : "LOW",
- "exploitabilityScore" : 4.9,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0028"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "https://github.com/Microsoft/ChakraCore/commit/402f3d967c0a905ec5b9ca9c240783d3f2c15724"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists when Microsoft scripting engine improperly accesses objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user, aka \"Scripting Engine Memory Corruption Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 9.8,
- "baseSeverity" : "CRITICAL"
- },
- "exploitabilityScore" : 3.9,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 10.0
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 10.0,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-07-17T13:18Z",
- "lastModifiedDate" : "2017-08-04T13:54Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0029"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "office",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "word",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- }, {
- "version_value" : "2013"
- }, {
- "version_value" : "2016"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-284"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96045"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0029"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Office 2010 SP2, Word 2010 SP2, Word 2013 RT SP1, and Word 2016 allow remote attackers to cause a denial of service (application hang) via a crafted Office document, aka \"Microsoft Office Denial of Service Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2013:sp1:~~rt~~~",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2016",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "HIGH",
- "baseScore" : 5.5,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:N/A:P)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0030"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "office",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "office_compatibility_pack",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "office_web_apps",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "sharepoint_server",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "word",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- }, {
- "version_value" : "2010"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96051"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0030"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Office Web Apps Server 2010 SP2, Word 2007 SP3, Word 2010 SP2, and Word Automation Services on SharePoint Server 2010 SP2 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka \"Microsoft Office Memory Corruption Vulnerability.\" This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0031, CVE-2017-0052, and CVE-2017-0053."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_compatibility_pack::sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_web_apps:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:sharepoint_server:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0031"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "office",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "office_compatibility_pack",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "word",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- }, {
- "version_value" : "2010"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96052"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0031"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Word 2007 SP3, and Word 2010 SP2 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka \"Microsoft Office Memory Corruption Vulnerability.\" This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0052, and CVE-2017-0053."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_compatibility_pack::sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0032"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96080"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0032"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "AND",
- "children" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
- } ]
- }, {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0033"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96087"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0033"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Internet Explorer 11 and Microsoft Edge allow remote attackers to spoof web content via a crafted web site, aka \"Microsoft Browser Spoofing Vulnerability.\" This vulnerability is different from those described in CVE-2017-0012 and CVE-2017-0069."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "LOW",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:P/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0034"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96786"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0034"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists when Microsoft Edge improperly accesses objects in memory. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0035"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96082"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0035"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "AND",
- "children" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
- } ]
- }, {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0037"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-704"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96088"
- }, {
- "url" : "http://www.securitytracker.com/id/1037905"
- }, {
- "url" : "http://www.securitytracker.com/id/1037906"
- }, {
- "url" : "https://0patch.blogspot.si/2017/03/0patching-another-0-day-internet.html"
- }, {
- "url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1011"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0037"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41454/"
- }, {
- "url" : "https://www.exploit-db.com/exploits/42354/"
- }, {
- "url" : "https://www.exploit-db.com/exploits/43125/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Internet Explorer 10 and 11 and Microsoft Edge have a type confusion issue in the Layout::MultiColumnBoxBuilder::HandleColumnBreakOnColumnSpanningElement function in mshtml.dll, which allows remote attackers to execute arbitrary code via vectors involving a crafted Cascading Style Sheets (CSS) token sequence and crafted JavaScript code that operates on a TH element."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.1,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.2,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-02-26T23:59Z",
- "lastModifiedDate" : "2017-11-19T02:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0038"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96023"
- }, {
- "url" : "http://www.securitytracker.com/id/1037845"
- }, {
- "url" : "https://0patch.blogspot.com/2017/02/0patching-0-day-windows-gdi32dll-memory.html"
- }, {
- "url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=992"
- }, {
- "url" : "https://github.com/k0keoyo/CVE-2017-0038-EXP-C-JS"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0038"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41363/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "gdi32.dll in Graphics Device Interface (GDI) in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process heap memory via a crafted EMF file, as demonstrated by an EMR_SETDIBITSTODEVICE record with modified Device Independent Bitmap (DIB) dimensions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-3216, CVE-2016-3219, and/or CVE-2016-3220."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 5.5,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-02-20T16:59Z",
- "lastModifiedDate" : "2017-09-01T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0039"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96024"
- }, {
- "url" : "http://www.securitytracker.com/id/1038001"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0039"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Windows Vista SP2 and Server 2008 SP2 mishandle dynamic link library (DLL) loading, which allows local users to gain privileges via a crafted application, aka \"Library Loading Input Validation Remote Code Execution Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0040"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "9"
- }, {
- "version_value" : "10"
- }, {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.security-assessment.com/files/documents/advisory/reversesegment.pdf"
- }, {
- "url" : "http://www.securityfocus.com/bid/96094"
- }, {
- "url" : "http://www.securitytracker.com/id/1038008"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0040"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The scripting engine in Microsoft Internet Explorer 9 through 11 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka \"Scripting Engine Memory Corruption Vulnerability.\" This vulnerability is different from that described in CVE-2017-0130."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:9",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:10",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0042"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://pastebin.com/raw/Eztknq4s"
- }, {
- "url" : "http://www.securityfocus.com/bid/96098"
- }, {
- "url" : "http://www.securitytracker.com/id/1038016"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0042"
- }, {
- "url" : "https://twitter.com/Qab/status/842506404950917120"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Windows Media Player in Microsoft Windows 8.1; Windows Server 2012 R2; Windows RT 8.1; Windows 7 SP1; Windows 2008 SP2 and R2 SP1, Windows Server 2016; Windows Vista SP2; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information via a crafted web site, aka \"Windows Media Player Information Disclosure Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 3.1,
- "baseSeverity" : "LOW"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 2.6
- },
- "severity" : "LOW",
- "exploitabilityScore" : 4.9,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0043"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96628"
- }, {
- "url" : "http://www.securitytracker.com/id/1038018"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0043"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Active Directory Federation Services in Microsoft Windows 10 1607, Windows Server 2008 SP2 and R2 SP1, Windows Server 2012 Gold and R2, and Windows Server 2016 allows local users to obtain sensitive information via a crafted application, aka \"Microsoft Active Directory Federation Services Information Disclosure Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 5.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 2.9
- },
- "severity" : "LOW",
- "exploitabilityScore" : 5.5,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0045"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-352"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://hyp3rlinx.altervista.org/advisories/MICROSOFT-DVD-MAKER-XML-EXTERNAL-ENTITY-FILE-DISCLOSURE.txt"
- }, {
- "url" : "http://www.securityfocus.com/bid/96103"
- }, {
- "url" : "http://www.securitytracker.com/id/1038015"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0045"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41619/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Windows DVD Maker in Windows 7 SP1, Windows Server 2008 SP2 and R2 SP1, and Windows Vista SP2 does not properly parse crafted .msdvd files, which allows attackers to obtain information to compromise a target system, aka \"Windows DVD Maker Cross-Site Request Forgery Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 5.5,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0047"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96034"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0047"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows local users to gain privileges via a crafted application, aka \"Windows GDI Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0001, CVE-2017-0005 and CVE-2017-0025."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0049"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96095"
- }, {
- "url" : "http://www.securitytracker.com/id/1038008"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0049"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The VBScript engine in Microsoft Internet Explorer 11 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Scripting Engine Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0018, and CVE-2017-0037."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0050"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96025"
- }, {
- "url" : "http://www.securitytracker.com/id/1038013"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0050"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel API in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7; Windows 8; Windows 10 Gold, 1511, and 1607; Windows RT 8.1; Windows Server 2012 Gold and R2; and Windows Server 2016 does not properly enforce permissions, which allows local users to spoof processes, spoof inter-process communication, or cause a denial of service via a crafted application, aka \"Windows Kernel Elevation of Privilege Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0051"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-284"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96026"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0051"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Windows 10 1607 and Windows Server 2016 allow remote attackers to cause a denial of service (application hang) via a crafted Office document, aka \"Microsoft Hyper-V Network Switch Denial of Service Vulnerability.\" This vulnerability is different from those described in CVE-2017-0074, CVE-2017-0076, CVE-2017-0097, CVE-2017-0098, and CVE-2017-0099."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "HIGH",
- "baseScore" : 5.4,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 4.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:N/C:N/I:N/A:P)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 2.9
- },
- "severity" : "LOW",
- "exploitabilityScore" : 5.5,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0052"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "excel",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- } ]
- }
- }, {
- "product_name" : "excel_viewer",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "office_compatibility_pack",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "sharepoint_server",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96741"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0052"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Office Compatibility Pack SP3, Excel 2007 SP3, Excel Viewer, and Excel Services on SharePoint Server 2007 SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka \"Microsoft Office Memory Corruption Vulnerability.\" This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, and CVE-2017-0053."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:excel_viewer",
- "cpe23Uri" : "cpe:2.3:a:microsoft:excel_viewer:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_compatibility_pack::sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:sharepoint_server:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2007:sp3:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0053"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "office",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "office_compatibility_pack",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "word",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- }, {
- "version_value" : "2010"
- }, {
- "version_value" : "2013"
- }, {
- "version_value" : "2016"
- } ]
- }
- }, {
- "product_name" : "word_viewer",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96745"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0053"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Office 2010 SP2, Office Compatibility Pack SP3, Word 2007 SP3, Word 2010 SP2, Word 2013 SP1, Word 2013 R2 SP1, Word 2016, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka \"Microsoft Office Memory Corruption Vulnerability.\" This vulnerability is different from those described in CVE-2017-0006, CVE-2017-0019, CVE-2017-0020, CVE-2017-0030, CVE-2017-0031, and CVE-2017-0052."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_compatibility_pack::sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2013:sp1",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2013:sp1:~~rt~~~",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2016",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word_viewer",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0055"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-79"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96622"
- }, {
- "url" : "http://www.securitytracker.com/id/1038012"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0055"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Internet Information Server (IIS) in Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to perform cross-site scripting and run script with local user privileges via a crafted request, aka \"Microsoft IIS Server XSS Elevation of Privilege Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "CHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "LOW",
- "availabilityImpact" : "NONE",
- "baseScore" : 6.1,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 2.7
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:P/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0056"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96630"
- }, {
- "url" : "http://www.securitytracker.com/id/1038017"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0056"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, CVE-2017-0082."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0057"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96695"
- }, {
- "url" : "http://www.securitytracker.com/id/1038001"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0057"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "DNS client in Microsoft Windows 8.1; Windows Server 2012 R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 fails to properly process DNS queries, which allows remote attackers to obtain sensitive information via (1) convincing a workstation user to visit an untrusted webpage or (2) tricking a server into sending a DNS query to a malicious DNS server, aka \"Windows DNS Query Information Disclosure Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0058"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- }, {
- "version_value" : "1703"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/97462"
- }, {
- "url" : "http://www.securitytracker.com/id/1038239"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0058"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41879/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A Win32k information disclosure vulnerability exists in Microsoft Windows when the win32k component improperly provides kernel information. An attacker who successfully exploited the vulnerability could obtain information to further compromise the user's system, aka \"Win32k Information Disclosure Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1703",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
- "attackVector" : "LOCAL",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.7,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 1.9
- },
- "severity" : "LOW",
- "exploitabilityScore" : 3.4,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-04-12T14:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0059"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "9"
- }, {
- "version_value" : "10"
- }, {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96645"
- }, {
- "url" : "http://www.securitytracker.com/id/1038008"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0059"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41661/"
- }, {
- "url" : "https://www.exploit-db.com/exploits/42354/"
- }, {
- "url" : "https://www.exploit-db.com/exploits/43125/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Internet Explorer 9 through 11 allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Internet Explorer Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0008 and CVE-2017-0009."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:9",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:10",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-11-19T02:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0060"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96713"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0060"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41656/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"GDI+ Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
- "attackVector" : "LOCAL",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.7,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 1.9
- },
- "severity" : "LOW",
- "exploitabilityScore" : 3.4,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0061"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96638"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0061"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41657/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Color Management Module (ICM32.dll) memory handling functionality in Windows Vista SP2, Windows Server 2008 SP2 and R2, and Windows 7 SP1 allows remote attackers to bypass ASLR and execute code in combination with another vulnerability through a crafted website, aka \"Microsoft Color Management Information Disclosure Vulnerability.\" This vulnerability is different from that described in CVE-2017-0063."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 5.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 2.6
- },
- "severity" : "LOW",
- "exploitabilityScore" : 4.9,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0062"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96715"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0062"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41658/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"GDI+ Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0073."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
- "attackVector" : "LOCAL",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.7,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 1.9
- },
- "severity" : "LOW",
- "exploitabilityScore" : 3.4,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0063"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96643"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0063"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41659/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Color Management Module (ICM32.dll) memory handling functionality in Windows Vista SP2; Windows Server 2008 SP2 and R2; and Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows remote attackers to bypass ASLR and execute code in combination with another vulnerability through a crafted website, aka \"Microsoft Color Management Information Disclosure Vulnerability.\" This vulnerability is different from that described in CVE-2017-0061."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 6.5,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0064"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "internet_explorer",
- "version" : {
- "version_data" : [ {
- "version_value" : "9"
- }, {
- "version_value" : "10"
- }, {
- "version_value" : "11"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-254"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/98121"
- }, {
- "url" : "http://www.securitytracker.com/id/1038447"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0064"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A security feature bypass vulnerability exists in Internet Explorer that allows for bypassing Mixed Content warnings, aka \"Internet Explorer Security Feature Bypass Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:9",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:9:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:10",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:10:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:internet_explorer:11",
- "cpe23Uri" : "cpe:2.3:a:microsoft:internet_explorer:11:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "NONE",
- "baseScore" : 6.5,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:P/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-05-12T14:29Z",
- "lastModifiedDate" : "2017-07-08T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0065"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96648"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0065"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Edge allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Microsoft Browser Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0011, CVE-2017-0017, and CVE-2017-0068."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0066"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-284"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96655"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0066"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Edge allows remote attackers to bypass the Same Origin Policy for HTML elements in other browser windows, aka \"Microsoft Edge Security Feature Bypass Vulnerability.\" This vulnerability is different from those described in CVE-2017-0135 and CVE-2017-0140."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "LOW",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.2,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 2.5
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:P/I:P/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.0
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 4.9,
- "impactScore" : 4.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0067"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96662"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0067"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "AND",
- "children" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
- } ]
- }, {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0068"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96649"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0068"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Browsers in Microsoft Edge allow remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Microsoft Edge Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0009, CVE-2017-0011, CVE-2017-0017, and CVE-2017-0065."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0069"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96650"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0069"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Edge allows remote attackers to spoof web content via a crafted web site, aka \"Microsoft Edge Spoofing Vulnerability.\" This vulnerability is different from those described in CVE-2017-0012 and CVE-2017-0033."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "LOW",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:P/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0070"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96690"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0070"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41623/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "AND",
- "children" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
- } ]
- }, {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0071"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96681"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0071"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "AND",
- "children" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
- } ]
- }, {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0072"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-19"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96599"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0072"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41654/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Uniscribe Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0073"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96637"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0073"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Graphics Device Interface (GDI) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Windows GDI+ Information Disclosure Vulnerability.\" This vulnerability is different from those described in CVE-2017-0060 and CVE-2017-0062."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0074"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96641"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0074"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka \"Hyper-V Denial of Service Vulnerability.\" This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0076, CVE-2017-0097, and CVE-2017-0099."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "HIGH",
- "baseScore" : 5.4,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 4.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:S/C:N/I:N/A:P)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "SINGLE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 2.3
- },
- "severity" : "LOW",
- "exploitabilityScore" : 4.4,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0075"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-284"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96698"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0075"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka \"Hyper-V Remote Code Execution Vulnerability.\" This vulnerability is different from that described in CVE-2017-0109."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.6,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 6.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:S/C:C/I:C/A:C)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "SINGLE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.4
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.4,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0076"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96636"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0076"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka \"Hyper-V Denial of Service Vulnerability.\" This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0097, and CVE-2017-0099."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "HIGH",
- "baseScore" : 5.4,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 4.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:N/C:N/I:N/A:P)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 2.9
- },
- "severity" : "LOW",
- "exploitabilityScore" : 5.5,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0077"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- }, {
- "version_value" : "1703"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/98114"
- }, {
- "url" : "http://www.securitytracker.com/id/1038454"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0077"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allow a local authenticated attacker to execute a specially crafted application to obtain information, or in Windows 7 and later, cause denial of service, aka \"Win32k Information Disclosure Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1703",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-05-12T14:29Z",
- "lastModifiedDate" : "2017-07-08T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0078"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96631"
- }, {
- "url" : "http://www.securitytracker.com/id/1038017"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0078"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Microsoft Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0079, CVE-2017-0080, CVE-2017-0081, CVE-2017-0082."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0079"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "r2"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96632"
- }, {
- "url" : "http://www.securitytracker.com/id/1038017"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0079"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Windows 8.1; Windows Server 2012 R2; Windows RT 8.1; and Windows 10 Gold, 1511, and 1607 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0080, CVE-2017-0081, and CVE-2017-0082."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0080"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96633"
- }, {
- "url" : "http://www.securitytracker.com/id/1038017"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0080"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0081, and CVE-2017-0082."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0081"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96634"
- }, {
- "url" : "http://www.securitytracker.com/id/1038017"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0081"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Microsoft Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, CVE-2017-0082."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0082"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-264"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96635"
- }, {
- "url" : "http://www.securitytracker.com/id/1038017"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0082"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Microsoft Windows 10 Gold and 1511 allow local users to gain privileges via a crafted application, aka \"Win32k Elevation of Privilege Vulnerability.\" This vulnerability is different from those described in CVE-2017-0024, CVE-2017-0026, CVE-2017-0056, CVE-2017-0078, CVE-2017-0079, CVE-2017-0080, and CVE-2017-0081."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:C/I:C/A:C)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.2
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 3.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0083"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96608"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0083"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41655/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Uniscribe Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0084"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96610"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0084"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41648/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, and 1607, and Windows Server 2016 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Windows Uniscribe Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-:gold",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:gold:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0085"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96652"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0085"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41646/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Uniscribe Information Disclosure Vulnerability.\" CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0086"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96603"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0086"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41649/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Uniscribe Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0087, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0087"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96604"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0087"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41650/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Uniscribe Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0088, CVE-2017-0089, and CVE-2017-0090."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0088"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96605"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0088"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41651/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Windows Uniscribe Remote Code Execution Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0089"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96606"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0089"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41652/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Uniscribe Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, and CVE-2017-0090."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0090"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96607"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0090"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41653/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Uniscribe Remote Code Execution Vulnerability.\" This vulnerability is different from those described in CVE-2017-0072, CVE-2017-0083, CVE-2017-0084, CVE-2017-0086, CVE-2017-0087, CVE-2017-0088, and CVE-2017-0089."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0091"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96657"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0091"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41655/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Uniscribe Information Disclosure Vulnerability.\" CVE-2017-0085, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0092"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96676"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0092"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41655/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Uniscribe Information Disclosure Vulnerability.\" CVE-2017-0085, CVE-2017-0091, CVE-2017-0111, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0093"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/97419"
- }, {
- "url" : "http://www.securitytracker.com/id/1038234"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0093"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability in Microsoft Edge exists in the way that the Scripting Engine renders when handling objects in memory in Microsoft browsers. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user, aka \"Scripting Engine Memory Corruption Vulnerability.\" This CVE ID is unique from CVE-2017-0201."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-04-12T14:59Z",
- "lastModifiedDate" : "2017-07-11T01:33Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0094"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "edge",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96682"
- }, {
- "url" : "http://www.securitytracker.com/id/1038006"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0094"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A remote code execution vulnerability exists in the way affected Microsoft scripting engines render when handling objects in memory in Microsoft browsers. These vulnerabilities could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. This vulnerability is different from those described in CVE-2017-0010, CVE-2017-0015, CVE-2017-0032, CVE-2017-0035, CVE-2017-0067, CVE-2017-0070, CVE-2017-0071, CVE-2017-0094, CVE-2017-0131, CVE-2017-0132, CVE-2017-0133, CVE-2017-0134, CVE-2017-0136, CVE-2017-0137, CVE-2017-0138, CVE-2017-0141, CVE-2017-0150, and CVE-2017-0151."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "AND",
- "children" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:edge:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:edge:-:*:*:*:*:*:*:*"
- } ]
- }, {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : false,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.5,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.6,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:H/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "HIGH",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.6
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.9,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0095"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-284"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96699"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0095"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607 and Windows Server 2016 does not properly validate vSMB packet data, which allows attackers to execute arbitrary code on a target OS, aka \"Hyper-V vSMB Remote Code Execution Vulnerability.\" This vulnerability is different from that described in CVE-2017-0021."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.6,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 6.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.9
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 5.5,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0096"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96701"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0096"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to obtain sensitive information from host OS memory via a crafted application, aka \"Hyper-V Information Disclosure Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 2.6,
- "baseSeverity" : "LOW"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:S/C:P/I:N/A:N)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "SINGLE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 2.3
- },
- "severity" : "LOW",
- "exploitabilityScore" : 4.4,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0097"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96639"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0097"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 and R2; Windows 10, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka \"Hyper-V Denial of Service Vulnerability.\" This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0076, and CVE-2017-0099."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "HIGH",
- "baseScore" : 5.4,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 4.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:S/C:N/I:N/A:P)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "SINGLE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 2.3
- },
- "severity" : "LOW",
- "exploitabilityScore" : 4.4,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0098"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96642"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0098"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka \"Hyper-V Denial of Service Vulnerability.\" This vulnerability is different from those described in CVE-2017-0074, CVE-2017-0076, CVE-2017-0097, and CVE-2017-0099."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "HIGH",
- "baseScore" : 5.4,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 4.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:N/C:N/I:N/A:P)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 2.9
- },
- "severity" : "LOW",
- "exploitabilityScore" : 5.5,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0099"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96640"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0099"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and 2008 R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users, running as virtual machines, to cause a denial of service via a crafted application, aka \"Hyper-V Denial of Service Vulnerability.\" This vulnerability is different from those described in CVE-2017-0098, CVE-2017-0074, CVE-2017-0076, and CVE-2017-0097."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "HIGH",
- "baseScore" : 5.4,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 4.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:S/C:N/I:N/A:P)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "SINGLE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 2.3
- },
- "severity" : "LOW",
- "exploitabilityScore" : 4.4,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0100"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-287"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://blog.inspired-sec.com/archive/2017/03/17/COM-Moniker-Privesc.html"
- }, {
- "url" : "http://www.securityfocus.com/bid/96700"
- }, {
- "url" : "http://www.securitytracker.com/id/1038001"
- }, {
- "url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1021"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0100"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41607/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "A DCOM object in Helppane.exe in Microsoft Windows 7 SP1; Windows Server 2008 R2; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows local users to gain privileges via a crafted application, aka \"Windows HelpPane Elevation of Privilege Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7:-:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:M/Au:N/C:P/I:P/A:P)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 4.4
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 3.4,
- "impactScore" : 6.4,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0101"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96625"
- }, {
- "url" : "http://www.securitytracker.com/id/1038013"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0101"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel-mode drivers in Transaction Manager in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Windows Elevation of Privilege Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7:-:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:P/A:P)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 6.8
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 6.4,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0102"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_rt_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96627"
- }, {
- "url" : "http://www.securitytracker.com/id/1038013"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0102"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 let attackers with access to targets systems gain privileges when Windows fails to properly validate buffer lengths, aka \"Windows Elevation of Privilege Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7:-:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_rt_8.1:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:L/Au:N/C:P/I:P/A:P)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "LOW",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 4.6
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 3.9,
- "impactScore" : 6.4,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0103"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96623"
- }, {
- "url" : "http://www.securitytracker.com/id/1038013"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0103"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41645/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The kernel API in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, and Windows Server 2012 mishandles registry objects in memory, which allows local users to gain privileges via a crafted application, aka \"Windows Registry Elevation of Privilege Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7:-:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "LOW",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.0,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:L/AC:M/Au:N/C:P/I:P/A:P)",
- "accessVector" : "LOCAL",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "PARTIAL",
- "baseScore" : 4.4
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 3.4,
- "impactScore" : 6.4,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0104"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-190"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96697"
- }, {
- "url" : "http://www.securitytracker.com/id/1038001"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0104"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The iSNS Server service in Microsoft Windows Server 2008 SP2 and R2, Windows Server 2012 Gold and R2, and Windows Server 2016 allows remote attackers to issue malicious requests via an integer overflow, aka \"iSNS Server Memory Corruption Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:-:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:r2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012::r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:*:r2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
- "attackVector" : "NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "NONE",
- "userInteraction" : "NONE",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 8.1,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 2.2,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0105"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "office",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "office_compatibility_pack",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "office_web_apps",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "sharepoint_server",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "word",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- } ]
- }
- }, {
- "product_name" : "word_automation_services",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "word_for_mac",
- "version" : {
- "version_data" : [ {
- "version_value" : "2011"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96746"
- }, {
- "url" : "http://www.securitytracker.com/id/1038010"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0105"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from out-of-bound memory via a crafted Office document, aka \"Microsoft Office Information Disclosure Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_compatibility_pack:-:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_compatibility_pack:-:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office_web_apps:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:sharepoint_server:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word_automation_services:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word_automation_services:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word_for_mac:2011",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word_for_mac:2011:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 5.5,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 3.6
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0106"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "outlook",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- }, {
- "version_value" : "2010"
- }, {
- "version_value" : "2013"
- }, {
- "version_value" : "2016"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/97413"
- }, {
- "url" : "http://www.securitytracker.com/id/1038227"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0106"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft Excel 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka \"Microsoft Office Memory Corruption Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:outlook:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:outlook:2007:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:outlook:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:outlook:2013:sp1",
- "cpe23Uri" : "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:outlook:2016",
- "cpe23Uri" : "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-04-12T14:59Z",
- "lastModifiedDate" : "2017-07-11T01:33Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0107"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "sharepoint_foundation",
- "version" : {
- "version_data" : [ {
- "version_value" : "2013"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-79"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96748"
- }, {
- "url" : "http://www.securitytracker.com/id/1038019"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0107"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Microsoft SharePoint Server fails to sanitize crafted web requests, allowing remote attackers to run cross-script in local security context, aka \"Microsoft SharePoint XSS Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:sharepoint_foundation:2013:sp1",
- "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "CHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "LOW",
- "availabilityImpact" : "NONE",
- "baseScore" : 6.1,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 2.7
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:P/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0108"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "live_meeting",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- } ]
- }
- }, {
- "product_name" : "lync",
- "version" : {
- "version_data" : [ {
- "version_value" : "2010"
- }, {
- "version_value" : "2013"
- } ]
- }
- }, {
- "product_name" : "office",
- "version" : {
- "version_data" : [ {
- "version_value" : "2007"
- }, {
- "version_value" : "2010"
- } ]
- }
- }, {
- "product_name" : "silverlight",
- "version" : {
- "version_data" : [ {
- "version_value" : "5.0"
- } ]
- }
- }, {
- "product_name" : "skype_for_business",
- "version" : {
- "version_data" : [ {
- "version_value" : "2016"
- } ]
- }
- }, {
- "product_name" : "word_viewer",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-119"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96722"
- }, {
- "url" : "http://www.securitytracker.com/id/1038002"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0108"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41647/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "The Windows Graphics Component in Microsoft Office 2007 SP3; 2010 SP2; and Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Live Meeting 2007; Silverlight 5; Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka \"Graphics Component Remote Code Execution Vulnerability.\" This vulnerability is different from that described in CVE-2017-0014."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:live_meeting:2007",
- "cpe23Uri" : "cpe:2.3:a:microsoft:live_meeting:2007:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:lync:2010",
- "cpe23Uri" : "cpe:2.3:a:microsoft:lync:2010:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:lync:2013:sp1",
- "cpe23Uri" : "cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office:2007:sp3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office:2007:sp3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:office:2010:sp2",
- "cpe23Uri" : "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:silverlight:5.0",
- "cpe23Uri" : "cpe:2.3:a:microsoft:silverlight:5.0:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:skype_for_business:2016",
- "cpe23Uri" : "cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:word_viewer:-",
- "cpe23Uri" : "cpe:2.3:a:microsoft:word_viewer:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7:-:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista:-:sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:-:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
- "attackVector" : "LOCAL",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.8,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.8,
- "impactScore" : 5.9
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:C/I:C/A:C)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 9.3
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 8.6,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0109"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_10",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "1511"
- }, {
- "version_value" : "1607"
- } ]
- }
- }, {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_8.1",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2012",
- "version" : {
- "version_data" : [ {
- "version_value" : "-"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_server_2016",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-20"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96644"
- }, {
- "url" : "http://www.securitytracker.com/id/1037999"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0109"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Hyper-V in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allows guest OS users to execute arbitrary code on the host OS via a crafted application, aka \"Hyper-V Remote Code Execution Vulnerability.\" This vulnerability is different from that described in CVE-2017-0075."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1511",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1511:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_10:1607",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_8.1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_8.1:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:-",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2012:r2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2016",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
- "attackVector" : "ADJACENT_NETWORK",
- "attackComplexity" : "HIGH",
- "privilegesRequired" : "HIGH",
- "userInteraction" : "NONE",
- "scope" : "CHANGED",
- "confidentialityImpact" : "HIGH",
- "integrityImpact" : "HIGH",
- "availabilityImpact" : "HIGH",
- "baseScore" : 7.6,
- "baseSeverity" : "HIGH"
- },
- "exploitabilityScore" : 1.0,
- "impactScore" : 6.0
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:A/AC:M/Au:S/C:C/I:C/A:C)",
- "accessVector" : "ADJACENT_NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "SINGLE",
- "confidentialityImpact" : "COMPLETE",
- "integrityImpact" : "COMPLETE",
- "availabilityImpact" : "COMPLETE",
- "baseScore" : 7.4
- },
- "severity" : "HIGH",
- "exploitabilityScore" : 4.4,
- "impactScore" : 10.0,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : false
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-17T13:18Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0110"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "exchange_server",
- "version" : {
- "version_data" : [ {
- "version_value" : "2013"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-79"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96621"
- }, {
- "url" : "http://www.securitytracker.com/id/1038011"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0110"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Cross-site scripting (XSS) vulnerability in Microsoft Exchange Outlook Web Access (OWA) allows remote attackers to inject arbitrary web script or HTML via a crafted email or chat client, aka \"Microsoft Exchange Server Elevation of Privilege Vulnerability.\""
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:exchange_server:2013:cumulative_update_14",
- "cpe23Uri" : "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_14:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:exchange_server:2013:cumulative_update_3",
- "cpe23Uri" : "cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_3:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/a:microsoft:exchange_server:2013:sp1",
- "cpe23Uri" : "cpe:2.3:a:microsoft:exchange_server:2013:sp1:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "CHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "LOW",
- "availabilityImpact" : "NONE",
- "baseScore" : 6.1,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 2.7
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:N/I:P/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "NONE",
- "integrityImpact" : "PARTIAL",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-07-12T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0111"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96658"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0111"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41655/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Uniscribe Information Disclosure Vulnerability.\" CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0112, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0112"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96659"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0112"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41655/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Uniscribe Information Disclosure Vulnerability.\" CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0113, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:*:sp2:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_server_2008:r2:sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:*:*"
- }, {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_vista::sp2",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_vista:*:sp2:*:*:*:*:*:*"
- } ]
- } ]
- },
- "impact" : {
- "baseMetricV3" : {
- "cvssV3" : {
- "vectorString" : "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
- "attackVector" : "NETWORK",
- "attackComplexity" : "LOW",
- "privilegesRequired" : "NONE",
- "userInteraction" : "REQUIRED",
- "scope" : "UNCHANGED",
- "confidentialityImpact" : "LOW",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3,
- "baseSeverity" : "MEDIUM"
- },
- "exploitabilityScore" : 2.8,
- "impactScore" : 1.4
- },
- "baseMetricV2" : {
- "cvssV2" : {
- "vectorString" : "(AV:N/AC:M/Au:N/C:P/I:N/A:N)",
- "accessVector" : "NETWORK",
- "accessComplexity" : "MEDIUM",
- "authentication" : "NONE",
- "confidentialityImpact" : "PARTIAL",
- "integrityImpact" : "NONE",
- "availabilityImpact" : "NONE",
- "baseScore" : 4.3
- },
- "severity" : "MEDIUM",
- "exploitabilityScore" : 8.6,
- "impactScore" : 2.9,
- "obtainAllPrivilege" : false,
- "obtainUserPrivilege" : false,
- "obtainOtherPrivilege" : false,
- "userInteractionRequired" : true
- }
- },
- "publishedDate" : "2017-03-17T00:59Z",
- "lastModifiedDate" : "2017-08-16T01:29Z"
- }, {
- "cve" : {
- "data_type" : "CVE",
- "data_format" : "MITRE",
- "data_version" : "4.0",
- "CVE_data_meta" : {
- "ID" : "CVE-2017-0113"
- },
- "affects" : {
- "vendor" : {
- "vendor_data" : [ {
- "vendor_name" : "microsoft",
- "product" : {
- "product_data" : [ {
- "product_name" : "windows_7",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- }, {
- "product_name" : "windows_server_2008",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- }, {
- "version_value" : "r2"
- } ]
- }
- }, {
- "product_name" : "windows_vista",
- "version" : {
- "version_data" : [ {
- "version_value" : "*"
- } ]
- }
- } ]
- }
- } ]
- }
- },
- "problemtype" : {
- "problemtype_data" : [ {
- "description" : [ {
- "lang" : "en",
- "value" : "CWE-200"
- } ]
- } ]
- },
- "references" : {
- "reference_data" : [ {
- "url" : "http://www.securityfocus.com/bid/96660"
- }, {
- "url" : "http://www.securitytracker.com/id/1037992"
- }, {
- "url" : "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0113"
- }, {
- "url" : "https://www.exploit-db.com/exploits/41655/"
- } ]
- },
- "description" : {
- "description_data" : [ {
- "lang" : "en",
- "value" : "Uniscribe in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, and Windows 7 SP1 allows remote attackers to obtain sensitive information from process memory via a crafted web site, aka \"Uniscribe Information Disclosure Vulnerability.\" CVE-2017-0085, CVE-2017-0091, CVE-2017-0092, CVE-2017-0111, CVE-2017-0112, CVE-2017-0114, CVE-2017-0115, CVE-2017-0116, CVE-2017-0117, CVE-2017-0118, CVE-2017-0119, CVE-2017-0120, CVE-2017-0121, CVE-2017-0122, CVE-2017-0123, CVE-2017-0124, CVE-2017-0125, CVE-2017-0126, CVE-2017-0127, and CVE-2017-0128."
- } ]
- }
- },
- "configurations" : {
- "CVE_data_version" : "4.0",
- "nodes" : [ {
- "operator" : "OR",
- "cpe" : [ {
- "vulnerable" : true,
- "cpeMatchString" : "cpe:/o:microsoft:windows_7::sp1",
- "cpe23Uri" : "cpe:2.3:o:microsoft:windows_7:*:sp1:*:*:*:*:*:*"
- }, {