cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-1147,https://securityvulnerability.io/vulnerability/CVE-2020-1147,,"A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.",Microsoft,"Microsoft Sharepoint Enterprise Server,Microsoft Sharepoint Server,Microsoft Visual Studio 2019,Microsoft Visual Studio 2019 Version 16.6 (includes 16.0 - 16.5),Microsoft Visual Studio 2017 Version 15.9 (includes 15.0 - 15.8),Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),.net Core,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1909 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.6,Microsoft .net Framework 2.0,Microsoft .net Framework 3.0,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.5.2,Microsoft .net Framework 3.5 And 4.6/4.6.1/4.6.2 On Windows 10 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6/4.6.1/4.6.2 On Windows 10 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 2004 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 2004 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 2004 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 2004 For Arm64-based Systems",7.8,HIGH,0.9210000038146973,true,false,false,true,,false,false,2020-07-14T23:15:00.000Z,0 CVE-2020-1461,https://securityvulnerability.io/vulnerability/CVE-2020-1461,,"An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'.",Microsoft,"Microsoft Forefront Endpoint Protection,Microsoft System Center,Microsoft Security Essentials,Windows Defender On Windows 10 Version 1909 For 32-bit Systems,Windows Defender On Windows 10 Version 1909 For X64-based Systems,Windows Defender On Windows 10 Version 1909 For Arm64-based Systems,Windows Defender On Windows Server, Version 1909 (server Core Installation),Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2008 For 32-bit Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Server 2012 R2 (server Core Installation)",7.1,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2020-07-14T23:15:00.000Z,0 CVE-2020-1220,https://securityvulnerability.io/vulnerability/CVE-2020-1220,,"A spoofing vulnerability exists when theMicrosoft Edge (Chromium-based) in IE Mode improperly handles specific redirects, aka 'Microsoft Edge (Chromium-based) in IE Mode Spoofing Vulnerability'.",Microsoft,"Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1803 For Arm64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1803 For 32-bit Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1803 For X64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1709 For X64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1909 For X64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1903 For 32-bit Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1809 For Arm64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1809 For X64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows Server 2019,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 2004 For Arm64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1909 For 32-bit Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1903 For X64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1903 For Arm64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 2004 For X64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1809 For 32-bit Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows Server 2012 R2,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1607 For X64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows Rt 8.1,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 2004 For 32-bit Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1909 For Arm64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 7 For X64-based Systems Service Pack 1,Microsoft Edge (chromium-based) In Ie Mode On Windows Server 2012,Microsoft Edge (chromium-based) In Ie Mode On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1607 For 32-bit Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 8.1 For 32-bit Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows Server 2016,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1709 For Arm64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 Version 1709 For 32-bit Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 8.1 For X64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 For X64-based Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 10 For 32-bit Systems,Microsoft Edge (chromium-based) In Ie Mode On Windows 7 For 32-bit Systems Service Pack 1",6.1,MEDIUM,0.001979999942705035,false,false,false,false,,false,false,2020-06-09T19:43:29.000Z,0 CVE-2020-1170,https://securityvulnerability.io/vulnerability/CVE-2020-1170,,"An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1163.",Microsoft,"Microsoft Forefront Endpoint Protection,Microsoft System Center,Microsoft Security Essentials,Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1909 For 32-bit Systems,Windows Defender On Windows 10 Version 1909 For X64-based Systems,Windows Defender On Windows 10 Version 1909 For Arm64-based Systems,Windows Defender On Windows Server, Version 1909 (server Core Installation),Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2008 For 32-bit Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0017600000137463212,false,false,false,false,,false,false,2020-06-09T19:43:17.000Z,0 CVE-2020-1163,https://securityvulnerability.io/vulnerability/CVE-2020-1163,,"An elevation of privilege vulnerability exists in Windows Defender that leads arbitrary file deletion on the system.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Windows Defender Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1170.",Microsoft,"Microsoft Forefront Endpoint Protection,Microsoft System Center,Microsoft Security Essentials,Windows Defender On Windows 10 Version 1909 For 32-bit Systems,Windows Defender On Windows 10 Version 1909 For X64-based Systems,Windows Defender On Windows 10 Version 1909 For Arm64-based Systems,Windows Defender On Windows Server, Version 1909 (server Core Installation),Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2008 For 32-bit Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Server 2012 R2 (server Core Installation)",7.8,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2020-06-09T19:43:17.000Z,0 CVE-2020-1108,https://securityvulnerability.io/vulnerability/CVE-2020-1108,,"A denial of service vulnerability exists when .NET Core or .NET Framework improperly handles web requests, aka '.NET Core & .NET Framework Denial of Service Vulnerability'.",Microsoft,".net Core,Microsoft Visual Studio 2017 Version 15.9 (includes 15.1 - 15.8),Microsoft Visual Studio 2019,Microsoft Visual Studio 2019 Version 16.4 (includes 16.0 - 16.3),Microsoft Visual Studio 2019 Version 16.5,.net Core 5.0,Powershell Core,Powershell 7.0,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1909 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.6,Microsoft .net Framework 2.0,Microsoft .net Framework 3.0,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.5.2,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For Arm64-based Systems,Microsoft .net Framework 3.5 And 4.6/4.6.1/4.6.2 On Windows 10 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6/4.6.1/4.6.2 On Windows 10 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For Arm64-based Systems",7.5,HIGH,0.0016499999910593033,false,false,false,false,,false,false,2020-05-21T23:15:00.000Z,0 CVE-2020-1002,https://securityvulnerability.io/vulnerability/CVE-2020-1002,,"An elevation of privilege vulnerability exists when the MpSigStub.exe for Defender allows file deletion in arbitrary locations.To exploit the vulnerability, an attacker would first have to log on to the system, aka 'Microsoft Defender Elevation of Privilege Vulnerability'.",Microsoft,"Microsoft Forefront Endpoint Protection,Microsoft System Center,Microsoft Security Essentials,Windows Defender On Windows 10 Version 1909 For 32-bit Systems,Windows Defender On Windows 10 Version 1909 For X64-based Systems,Windows Defender On Windows 10 Version 1909 For Arm64-based Systems,Windows Defender On Windows Server, Version 1909 (server Core Installation),Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2008 For 32-bit Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Server 2012 R2 (server Core Installation)",7.1,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2020-04-15T15:13:20.000Z,0 CVE-2020-0646,https://securityvulnerability.io/vulnerability/CVE-2020-0646,,"A remote code execution vulnerability exists when the Microsoft .NET Framework fails to validate input properly, aka '.NET Framework Remote Code Execution Injection Vulnerability'.",Microsoft,"Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 4.6,Microsoft .net Framework 3.0,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.5.2,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1909 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 For X64-based Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016",9.8,CRITICAL,0.9742900133132935,true,false,false,true,,false,false,2020-01-14T23:11:38.000Z,0 CVE-2020-0606,https://securityvulnerability.io/vulnerability/CVE-2020-0606,,"A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0605.",Microsoft,".net Core,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 4.6,Microsoft .net Framework 3.0,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5.1,Microsoft .net Framework 4.5.2,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1909 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For X64-based Systems",8.8,HIGH,0.05951999872922897,false,false,false,true,true,false,false,2020-01-14T23:11:22.000Z,0 CVE-2020-0605,https://securityvulnerability.io/vulnerability/CVE-2020-0605,,"A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0606.",Microsoft,".net Core,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 3.0,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1909 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1909 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 4.6,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.5.2,Microsoft .net Framework 3.5.1,Microsoft .net Framework 3.5,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 For X64-based Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016,Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 3.5 And 4.6.2/4.7/4.7.1/4.7.2 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.1/4.7.2 On Windows 10 Version 1709 For X64-based Systems",8.8,HIGH,0.05951999872922897,false,false,false,false,,false,false,2020-01-14T23:11:21.000Z,0 CVE-2019-1255,https://securityvulnerability.io/vulnerability/CVE-2019-1255,,"A denial of service vulnerability exists when Microsoft Defender improperly handles files, aka 'Microsoft Defender Denial of Service Vulnerability'.",Microsoft,"Microsoft Security Essentials,Microsoft System Center,Microsoft Forefront Endpoint Protection,Windows Defender On Windows 7 For 32-bit Systems,Windows Defender On Windows 7 For X64-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems (server Core Installation),Windows Defender On Windows Server 2008 R2 For Itanium-based Systems,Windows Defender On Windows Server 2008 R2 For X64-based Systems,Windows Defender On Windows Server 2008 For 32-bit Systems (server Core Installation),Windows Defender On Windows Server 2012,Windows Defender On Windows Server 2012 (server Core Installation),Windows Defender On Windows 8.1 For 32-bit Systems,Windows Defender On Windows 8.1 For X64-based Systems,Windows Defender On Windows Server 2012 R2,Windows Defender On Windows Rt 8.1,Windows Defender On Windows Server 2012 R2 (server Core Installation),Windows Defender On Windows 10 For 32-bit Systems,Windows Defender On Windows 10 For X64-based Systems,Windows Defender On Windows Server 2016,Windows Defender On Windows 10 Version 1607 For 32-bit Systems,Windows Defender On Windows 10 Version 1607 For X64-based Systems,Windows Defender On Windows Server 2016 (server Core Installation),Windows Defender On Windows 10 Version 1703 For 32-bit Systems,Windows Defender On Windows 10 Version 1703 For X64-based Systems,Windows Defender On Windows 10 Version 1709 For 32-bit Systems,Windows Defender On Windows 10 Version 1709 For X64-based Systems,Windows Defender On Windows 10 Version 1803 For 32-bit Systems,Windows Defender On Windows 10 Version 1803 For X64-based Systems,Windows Defender On Windows Server, Version 1803 (server Core Installation),Windows Defender On Windows 10 Version 1803 For Arm64-based Systems,Windows Defender On Windows 10 Version 1809 For 32-bit Systems,Windows Defender On Windows 10 Version 1809 For X64-based Systems,Windows Defender On Windows 10 Version 1809 For Arm64-based Systems,Windows Defender On Windows Server 2019,Windows Defender On Windows Server 2019 (server Core Installation),Windows Defender On Windows 10 Version 1709 For Arm64-based Systems,Windows Defender On Windows 10 Version 1903 For 32-bit Systems,Windows Defender On Windows 10 Version 1903 For X64-based Systems,Windows Defender On Windows 10 Version 1903 For Arm64-based Systems,Windows Defender On Windows Server, Version 1903 (server Core Installation),Windows Defender On Windows Server 2008 For Itanium-based Systems,Windows Defender On Windows Server 2008 For 32-bit Systems",7.5,HIGH,0.002309999894350767,false,false,false,false,,false,false,2019-09-23T19:14:38.000Z,0 CVE-2019-1142,https://securityvulnerability.io/vulnerability/CVE-2019-1142,,"An elevation of privilege vulnerability exists when the .NET Framework common language runtime (CLR) allows file creation in arbitrary locations, aka '.NET Framework Elevation of Privilege Vulnerability'.",Microsoft,"Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1703 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1703 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5",5.5,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2019-09-11T21:24:57.000Z,0 CVE-2019-1113,https://securityvulnerability.io/vulnerability/CVE-2019-1113,,"A remote code execution vulnerability exists in .NET software when the software fails to check the source markup of a file.An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user, aka '.NET Framework Remote Code Execution Vulnerability'.",Microsoft,"Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6,Microsoft Visual Studio,Microsoft .net Framework 4.6/4.6.1/4.6.2,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft Visual Studio 2017,Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1703 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1703 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft Visual Studio 2019,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5,Microsoft .net Framework 3.0,Microsoft .net Framework 2.0,Microsoft .net Framework 3.5.1",8.8,HIGH,0.05951999872922897,false,false,false,false,,false,false,2019-07-15T19:15:00.000Z,0 CVE-2019-1083,https://securityvulnerability.io/vulnerability/CVE-2019-1083,,"A denial of service vulnerability exists when Microsoft Common Object Runtime Library improperly handles web requests, aka '.NET Denial of Service Vulnerability'.",Microsoft,"Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6,Microsoft .net Framework 4.6/4.6.1/4.6.2,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1703 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1703 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5,Microsoft .net Framework 3.0,Microsoft .net Framework 2.0,Microsoft .net Framework 3.5.1",7.5,HIGH,0.0015800000401213765,false,false,false,true,true,false,false,2019-07-15T18:56:21.000Z,0 CVE-2019-1006,https://securityvulnerability.io/vulnerability/CVE-2019-1006,,"An authentication bypass vulnerability exists in Windows Communication Foundation (WCF) and Windows Identity Foundation (WIF), allowing signing of SAML tokens with arbitrary symmetric keys, aka 'WCF/WIF SAML Token Authentication Bypass Vulnerability'.",Microsoft,"Windows,Windows Server,Microsoft Sharepoint Foundation,Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6,Microsoft Sharepoint Enterprise Server,Microsoft .net Framework 4.6/4.6.1/4.6.2,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft Sharepoint Server,Windows 10 Version 1903 For 32-bit Systems,Windows 10 Version 1903 For X64-based Systems,Windows 10 Version 1903 For Arm64-based Systems,Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1703 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1703 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 And 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019,Microsoft .net Framework 3.5 And 4.7.2 On Windows Server 2019 (server Core Installation),Microsoft.identitymodel,Microsoft .net Framework 3.5,Microsoft .net Framework 3.0,Microsoft .net Framework 2.0,Microsoft .net Framework 3.5.1",7.5,HIGH,0.0016700000269338489,false,false,false,true,true,false,false,2019-07-15T18:56:20.000Z,0 CVE-2019-0981,https://securityvulnerability.io/vulnerability/CVE-2019-0981,,"A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests, aka '.Net Framework and .Net Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0820, CVE-2019-0980.",Microsoft,"Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6,Microsoft .net Framework 4.6.2 On Windows 10 For 32-bit Systems,Microsoft .net Framework 4.6.2 On Windows 10 For X64-based Systems,.net Core,Microsoft .net Framework 4.7.2,Microsoft .net Framework 4.7.2 On Windows 10 Version 1809 For Arm64-based Systems,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.7/4.7.1/4.7.2,Microsoft .net Framework 4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1703 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1703 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2019,Microsoft .net Framework 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5,Microsoft .net Framework 3.5 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.0,Microsoft .net Framework 2.0,Microsoft .net Framework 3.5.1",7.5,HIGH,0.002460000105202198,false,false,false,false,,false,false,2019-05-16T18:24:57.000Z,0 CVE-2019-0980,https://securityvulnerability.io/vulnerability/CVE-2019-0980,,"A denial of service vulnerability exists when .NET Framework or .NET Core improperly handle web requests, aka '.Net Framework and .Net Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0820, CVE-2019-0981.",Microsoft,"Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6,Microsoft .net Framework 4.6.2 On Windows 10 For 32-bit Systems,Microsoft .net Framework 4.6.2 On Windows 10 For X64-based Systems,.net Core,Microsoft .net Framework 4.7.2,Microsoft .net Framework 4.7.2 On Windows 10 Version 1809 For Arm64-based Systems,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.7/4.7.1/4.7.2,Microsoft .net Framework 4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1703 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1703 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2019,Microsoft .net Framework 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5,Microsoft .net Framework 3.5 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.0,Microsoft .net Framework 2.0,Microsoft .net Framework 3.5.1",7.5,HIGH,0.002460000105202198,false,false,false,false,,false,false,2019-05-16T18:24:57.000Z,0 CVE-2019-0864,https://securityvulnerability.io/vulnerability/CVE-2019-0864,,"A denial of service vulnerability exists when .NET Framework improperly handles objects in heap memory, aka '.NET Framework Denial of Service Vulnerability'.",Microsoft,"Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6,Microsoft .net Framework 4.6.2 On Windows 10 For 32-bit Systems,Microsoft .net Framework 4.6.2 On Windows 10 For X64-based Systems,Microsoft .net Framework 4.7.2,Microsoft .net Framework 4.7.2 On Windows 10 Version 1809 For Arm64-based Systems,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.7/4.7.1/4.7.2,Microsoft .net Framework 4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1703 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1703 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2019,Microsoft .net Framework 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5,Microsoft .net Framework 3.5 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.0,Microsoft .net Framework 2.0,Microsoft .net Framework 3.5.1",5.5,MEDIUM,0.000590000010561198,false,false,false,false,,false,false,2019-05-16T18:17:00.000Z,0 CVE-2019-0820,https://securityvulnerability.io/vulnerability/CVE-2019-0820,,"A denial of service vulnerability exists when .NET Framework and .NET Core improperly process RegEx strings, aka '.NET Framework and .NET Core Denial of Service Vulnerability'. This CVE ID is unique from CVE-2019-0980, CVE-2019-0981.",Microsoft,"Microsoft .net Framework 4.5.2,Microsoft .net Framework 4.6,.net Core,Microsoft .net Framework 4.7.2,Microsoft .net Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.6.2/4.7/4.7.1/4.7.2,Microsoft .net Framework 4.8 On Windows 7 For 32-bit Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows 7 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2008 R2 For X64-based Systems Service Pack 1,Microsoft .net Framework 4.8 On Windows Server 2012,Microsoft .net Framework 4.8 On Windows Server 2012 (server Core Installation),Microsoft .net Framework 4.8 On Windows 8.1 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 8.1 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2012 R2,Microsoft .net Framework 4.8 On Windows Rt 8.1,Microsoft .net Framework 4.8 On Windows Server 2012 R2 (server Core Installation),Microsoft .net Framework 4.8 On Windows Server 2016,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1607 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2016 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1703 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1703 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1709 For X64-based Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1803 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1803 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1809 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1809 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server 2019,Microsoft .net Framework 4.8 On Windows Server 2019 (server Core Installation),Microsoft .net Framework 4.8 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 4.8 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 4.8 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.5,Microsoft .net Framework 3.5 On Windows 10 Version 1903 For 32-bit Systems,Microsoft .net Framework 3.5 On Windows 10 Version 1903 For X64-based Systems,Microsoft .net Framework 3.5 On Windows Server, Version 1903 (server Core Installation),Microsoft .net Framework 3.0,Microsoft .net Framework 2.0,Microsoft .net Framework 3.5.1",7.5,HIGH,0.002090000081807375,false,false,false,false,,false,false,2019-05-16T18:17:00.000Z,0 CVE-2019-0582,https://securityvulnerability.io/vulnerability/CVE-2019-0582,,"A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ""Jet Database Engine Remote Code Execution Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0583, CVE-2019-0584.",Microsoft,"Windows 7,Windows Server 2012 R2,Windows Rt 8.1,Windows Server 2008,Windows Server 2019,Windows Server 2012,Windows 8.1,Windows Server 2016,Windows Server 2008 R2,Windows 10,Windows 10 Servers",7.8,HIGH,0.022789999842643738,false,false,false,false,,false,false,2019-01-08T21:00:00.000Z,0 CVE-2019-0580,https://securityvulnerability.io/vulnerability/CVE-2019-0580,,"A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ""Jet Database Engine Remote Code Execution Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.",Microsoft,"Windows 7,Windows Server 2012 R2,Windows Rt 8.1,Windows Server 2008,Windows Server 2019,Windows Server 2012,Windows 8.1,Windows Server 2016,Windows Server 2008 R2,Windows 10,Windows 10 Servers",7.8,HIGH,0.022789999842643738,false,false,false,false,,false,false,2019-01-08T21:00:00.000Z,0 CVE-2019-0583,https://securityvulnerability.io/vulnerability/CVE-2019-0583,,"A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ""Jet Database Engine Remote Code Execution Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0584.",Microsoft,"Windows 7,Windows Server 2012 R2,Windows Rt 8.1,Windows Server 2008,Windows Server 2019,Windows Server 2012,Windows 8.1,Windows Server 2016,Windows Server 2008 R2,Windows 10,Windows 10 Servers",7.8,HIGH,0.022789999842643738,false,false,false,false,,false,false,2019-01-08T21:00:00.000Z,0 CVE-2019-0579,https://securityvulnerability.io/vulnerability/CVE-2019-0579,,"A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ""Jet Database Engine Remote Code Execution Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0577, CVE-2019-0578, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.",Microsoft,"Windows 7,Windows Server 2012 R2,Windows Rt 8.1,Windows Server 2008,Windows Server 2019,Windows Server 2012,Windows 8.1,Windows Server 2016,Windows Server 2008 R2,Windows 10,Windows 10 Servers",7.8,HIGH,0.03446999937295914,false,false,false,false,,false,false,2019-01-08T21:00:00.000Z,0 CVE-2019-0577,https://securityvulnerability.io/vulnerability/CVE-2019-0577,,"A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory, aka ""Jet Database Engine Remote Code Execution Vulnerability."" This affects Windows 7, Windows Server 2012 R2, Windows RT 8.1, Windows Server 2008, Windows Server 2019, Windows Server 2012, Windows 8.1, Windows Server 2016, Windows Server 2008 R2, Windows 10, Windows 10 Servers. This CVE ID is unique from CVE-2019-0538, CVE-2019-0575, CVE-2019-0576, CVE-2019-0578, CVE-2019-0579, CVE-2019-0580, CVE-2019-0581, CVE-2019-0582, CVE-2019-0583, CVE-2019-0584.",Microsoft,"Windows 7,Windows Server 2012 R2,Windows Rt 8.1,Windows Server 2008,Windows Server 2019,Windows Server 2012,Windows 8.1,Windows Server 2016,Windows Server 2008 R2,Windows 10,Windows 10 Servers",7.8,HIGH,0.022789999842643738,false,false,false,false,,false,false,2019-01-08T21:00:00.000Z,0 CVE-2019-0552,https://securityvulnerability.io/vulnerability/CVE-2019-0552,,"An elevation of privilege exists in Windows COM Desktop Broker, aka ""Windows COM Elevation of Privilege Vulnerability."" This affects Windows Server 2012 R2, Windows RT 8.1, Windows Server 2019, Windows Server 2016, Windows 8.1, Windows 10, Windows 10 Servers.",Microsoft,"Windows Server 2012 R2,Windows Rt 8.1,Windows Server 2019,Windows Server 2016,Windows 8.1,Windows 10,Windows 10 Servers",8.8,HIGH,0.616890013217926,false,false,false,false,,false,false,2019-01-08T21:00:00.000Z,0