cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2019-1366,https://securityvulnerability.io/vulnerability/CVE-2019-1366,,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1335.",Microsoft,"Microsoft Edge (edgehtml-based) On Windows 10 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems,Chakracore",7.5,HIGH,0.02882000058889389,false,false,false,false,,false,false,2019-10-10T13:28:42.000Z,0 CVE-2019-1356,https://securityvulnerability.io/vulnerability/CVE-2019-1356,,"An information disclosure vulnerability exists when Microsoft Edge based on Edge HTML improperly handles objects in memory, aka 'Microsoft Edge based on Edge HTML Information Disclosure Vulnerability'.",Microsoft,"Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems",6.5,MEDIUM,0.03265000134706497,false,false,false,false,,false,false,2019-10-10T13:28:42.000Z,0 CVE-2019-1335,https://securityvulnerability.io/vulnerability/CVE-2019-1335,,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1308, CVE-2019-1366.",Microsoft,"Microsoft Edge (edgehtml-based) On Windows 10 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems,Chakracore",7.5,HIGH,0.02882000058889389,false,false,false,false,,false,false,2019-10-10T13:28:41.000Z,0 CVE-2019-1307,https://securityvulnerability.io/vulnerability/CVE-2019-1307,,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1308, CVE-2019-1335, CVE-2019-1366.",Microsoft,"Microsoft Edge (edgehtml-based) On Windows 10 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems,Chakracore",7.5,HIGH,0.02882000058889389,false,false,false,false,,false,false,2019-10-10T13:28:40.000Z,0 CVE-2019-1308,https://securityvulnerability.io/vulnerability/CVE-2019-1308,,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1307, CVE-2019-1335, CVE-2019-1366.",Microsoft,"Microsoft Edge (edgehtml-based) On Windows 10 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems,Chakracore",7.5,HIGH,0.02882000058889389,false,false,false,false,,false,false,2019-10-10T13:28:40.000Z,0 CVE-2019-0608,https://securityvulnerability.io/vulnerability/CVE-2019-0608,,"A spoofing vulnerability exists when Microsoft Browsers does not properly parse HTTP content, aka 'Microsoft Browser Spoofing Vulnerability'. This CVE ID is unique from CVE-2019-1357.",Microsoft,"Internet Explorer 9,Internet Explorer 11,Internet Explorer 11 On Windows Server 2012,Internet Explorer 11 On Windows 10 Version 1903 For 32-bit Systems,Internet Explorer 11 On Windows 10 Version 1903 For X64-based Systems,Internet Explorer 11 On Windows 10 Version 1903 For Arm64-based Systems,Internet Explorer 10,Microsoft Edge (edgehtml-based) On Windows 10 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems",4.3,MEDIUM,0.001019999966956675,false,false,false,false,,false,false,2019-10-10T13:28:40.000Z,0 CVE-2019-1255,https://securityvulnerability.io/vulnerability/CVE-2019-1255,,"A denial of service vulnerability exists when Microsoft Defender improperly handles files, aka 'Microsoft Defender Denial of Service Vulnerability'.",Microsoft,"Microsoft Security Essentials,Microsoft System Center,Microsoft Forefront Endpoint Protection,Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2012 R2 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 10 Version 1703 For 32-bit Systems,Windows Defender On Windows 10 Version 1703 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 For 32-bit Systems",7.5,HIGH,0.002309999894350767,false,false,false,false,,false,false,2019-09-23T19:14:38.000Z,0 CVE-2019-1298,https://securityvulnerability.io/vulnerability/CVE-2019-1298,,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1300.",Microsoft,"Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems,Chakracore",7.5,HIGH,0.032430000603199005,false,false,false,false,,false,false,2019-09-11T21:25:01.000Z,0 CVE-2019-1300,https://securityvulnerability.io/vulnerability/CVE-2019-1300,,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1237, CVE-2019-1298.",Microsoft,"Microsoft Edge (edgehtml-based) On Windows 10 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems,Chakracore",7.5,HIGH,0.032430000603199005,false,false,false,false,,false,false,2019-09-11T21:25:01.000Z,0 CVE-2019-1220,https://securityvulnerability.io/vulnerability/CVE-2019-1220,,"A security feature bypass vulnerability exists when Microsoft Browsers fail to validate the correct Security Zone of requests for specific URLs, aka 'Microsoft Browser Security Feature Bypass Vulnerability'.",Microsoft,"Internet Explorer 9,Internet Explorer 11,Internet Explorer 11 On Windows Server 2012,Internet Explorer 11 On Windows 10 Version 1903 For 32-bit Systems,Internet Explorer 11 On Windows 10 Version 1903 For X64-based Systems,Internet Explorer 11 On Windows 10 Version 1903 For Arm64-based Systems,Internet Explorer 10,Microsoft Edge (edgehtml-based) On Windows 10 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems",4.3,MEDIUM,0.0014900000533089042,false,false,false,false,,false,false,2019-09-11T21:24:58.000Z,0 CVE-2019-1237,https://securityvulnerability.io/vulnerability/CVE-2019-1237,,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1138, CVE-2019-1217, CVE-2019-1298, CVE-2019-1300.",Microsoft,"Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems,Chakracore",7.5,HIGH,0.032430000603199005,false,false,false,false,,false,false,2019-09-11T21:24:58.000Z,0 CVE-2019-1138,https://securityvulnerability.io/vulnerability/CVE-2019-1138,,"A remote code execution vulnerability exists in the way that the Chakra scripting engine handles objects in memory in Microsoft Edge, aka 'Chakra Scripting Engine Memory Corruption Vulnerability'. This CVE ID is unique from CVE-2019-1217, CVE-2019-1237, CVE-2019-1298, CVE-2019-1300.",Microsoft,"Microsoft Edge (edgehtml-based) On Windows Server 2016,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1703 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows Server 2019,Microsoft Edge (edgehtml-based) On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (edgehtml-based) On Windows 10 Version 1903 For Arm64-based Systems,Chakracore",7.5,HIGH,0.032430000603199005,false,false,false,false,,false,false,2019-09-11T21:24:57.000Z,0 CVE-2019-1142,https://securityvulnerability.io/vulnerability/CVE-2019-1142,,"An elevation of privilege vulnerability exists when the .NET Framework common language runtime (CLR) allows file creation in arbitrary locations, aka '.NET Framework Elevation of Privilege Vulnerability'.",Microsoft,"Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1703 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1703 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5",5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2019-09-11T21:24:57.000Z,0 CVE-2019-1125,https://securityvulnerability.io/vulnerability/CVE-2019-1125,Windows Kernel Information Disclosure Vulnerability,"An information disclosure vulnerability exists when certain central processing units (CPU) speculatively access memory. An attacker who successfully exploited the vulnerability could read privileged data across trust boundaries. To exploit this vulnerability, an attacker would have to log on to an affected system and run a specially crafted application. The vulnerability would not allow an attacker to elevate user rights directly, but it could be used to obtain information that could be used to try to compromise the affected system further. On January 3, 2018, Microsoft released an advisory and security updates related to a newly-discovered class of hardware vulnerabilities (known as Spectre) involving speculative execution side channels that affect AMD, ARM, and Intel CPUs to varying degrees. This vulnerability, released on August 6, 2019, is a variant of the Spectre Variant 1 speculative execution side channel vulnerability and has been assigned CVE-2019-1125. Microsoft released a security update on July 9, 2019 that addresses the vulnerability through a software change that mitigates how the CPU speculatively accesses memory. Note that this vulnerability does not require a microcode update from your device OEM. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Systems Service Pack 1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.6,MEDIUM,0.0027799999807029963,false,false,false,true,true,false,false,2019-09-03T17:52:41.000Z,0 CVE-2019-1198,https://securityvulnerability.io/vulnerability/CVE-2019-1198,Microsoft Windows Elevation of Privilege Vulnerability,"An elevation of privilege exists in SyncController.dll. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges. To exploit the vulnerability, an attacker could run a specially crafted application that could exploit the vulnerability. This vulnerability by itself does not allow arbitrary code to be run. However, this vulnerability could be used in conjunction with one or more vulnerabilities (e.g. a remote code execution vulnerability and another elevation of privilege) that could take advantage of the elevated privileges when running. The update addresses the vulnerability by correcting how the SyncController.dll handles processes these requests. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation)",6.5,MEDIUM,0.008270000107586384,false,false,false,false,,false,false,2019-08-14T20:55:05.000Z,0 CVE-2019-1179,https://securityvulnerability.io/vulnerability/CVE-2019-1179,Windows Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists in the way that the unistore.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the unistore.dll properly handles objects in memory. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation)",7,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2019-08-14T20:55:04.000Z,0 CVE-2019-1178,https://securityvulnerability.io/vulnerability/CVE-2019-1178,Windows Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the ssdpsrv.dll properly handles objects in memory. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Systems Service Pack 1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2019-08-14T20:55:04.000Z,0 CVE-2019-1180,https://securityvulnerability.io/vulnerability/CVE-2019-1180,Windows Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the wcmsvc.dll properly handles objects in memory. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2019-08-14T20:55:04.000Z,0 CVE-2019-1176,https://securityvulnerability.io/vulnerability/CVE-2019-1176,DirectX Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists when DirectX improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system. The update addresses the vulnerability by correcting how DirectX handles objects in memory. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation)",7,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2019-08-14T20:55:04.000Z,0 CVE-2019-1177,https://securityvulnerability.io/vulnerability/CVE-2019-1177,Windows Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists in the way that the rpcss.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the rpcss.dll properly handles objects in memory. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Systems Service Pack 1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2019-08-14T20:55:04.000Z,0 CVE-2019-1181,https://securityvulnerability.io/vulnerability/CVE-2019-1181,Remote Desktop Services Remote Code Execution Vulnerability,"A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Microsoft Remote Desktop For Android,Microsoft Remote Desktop For iOS,Microsoft Remote Desktop For Mac",9.8,CRITICAL,0.12138000130653381,false,false,false,true,true,false,false,2019-08-14T20:55:04.000Z,0 CVE-2019-1187,https://securityvulnerability.io/vulnerability/CVE-2019-1187,XmlLite Runtime Denial of Service Vulnerability,"A denial of service vulnerability exists when the XmlLite runtime (XmlLite.dll) improperly parses XML input. An attacker who successfully exploited this vulnerability could cause a denial of service against an XML application. A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an XML application. The update addresses the vulnerability by correcting how the XmlLite runtime parses XML input. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Systems Service Pack 1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",5.5,MEDIUM,0.008209999650716782,false,false,false,false,,false,false,2019-08-14T20:55:04.000Z,0 CVE-2019-1182,https://securityvulnerability.io/vulnerability/CVE-2019-1182,Remote Desktop Services Remote Code Execution Vulnerability,"A remote code execution vulnerability exists in Remote Desktop Services – formerly known as Terminal Services – when an unauthenticated attacker connects to the target system using RDP and sends specially crafted requests. This vulnerability is pre-authentication and requires no user interaction. An attacker who successfully exploited this vulnerability could execute arbitrary code on the target system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would need to send a specially crafted request to the target systems Remote Desktop Service via RDP. The update addresses the vulnerability by correcting how Remote Desktop Services handles connection requests. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 8.1,Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation),Microsoft Remote Desktop For Android,Microsoft Remote Desktop For iOS,Microsoft Remote Desktop For Mac",9.8,CRITICAL,0.12138000130653381,false,false,false,false,,false,false,2019-08-14T20:55:04.000Z,0 CVE-2019-1186,https://securityvulnerability.io/vulnerability/CVE-2019-1186,Windows Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists in the way that the wcmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. To exploit the vulnerability, a locally authenticated attacker could run a specially crafted application. The security update addresses the vulnerability by ensuring the wcmsvc.dll properly handles objects in memory. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation)",7,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2019-08-14T20:55:04.000Z,0 CVE-2019-1164,https://securityvulnerability.io/vulnerability/CVE-2019-1164,Windows Kernel Elevation of Privilege Vulnerability,"An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. To exploit this vulnerability, an attacker would first have to log on to the system. An attacker could then run a specially crafted application to take control of an affected system. The update addresses the vulnerability by correcting how the Windows kernel handles objects in memory. ",Microsoft,"Windows 10 Version 1703,Windows 10 Version 1803,Windows Server, Version 1803 (server Core Installation),Windows 10 Version 1809,Windows Server 2019,Windows Server 2019 (server Core Installation),Windows 10 Version 1709 For 32-bit Systems,Windows 10 Version 1709,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Windows 10 Version 1507,Windows 10 Version 1607,Windows Server 2016,Windows Server 2016 (server Core Installation),Windows 7,Windows 7 Service Pack 1,Windows 8.1,Windows Server 2008 Service Pack 2,Windows Server 2008 Service Pack 2 (server Core Installation),Windows Server 2008 Service Pack 2,Windows Server 2008 R2 Systems Service Pack 1,Windows Server 2008 R2 Service Pack 1,Windows Server 2008 R2 Service Pack 1 (server Core Installation),Windows Server 2012,Windows Server 2012 (server Core Installation),Windows Server 2012 R2,Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2019-08-14T20:55:03.000Z,0