{"id":"CVE-2019-0545","details":"An information disclosure vulnerability exists in .NET Framework and .NET Core which allows bypassing Cross-origin Resource Sharing (CORS) configurations, aka \".NET Framework Information Disclosure Vulnerability.\" This affects Microsoft .NET Framework 2.0, Microsoft .NET Framework 3.0, Microsoft .NET Framework 4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, Microsoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2, Microsoft .NET Framework 4.7/4.7.1/4.7.2, .NET Core 2.1, Microsoft .NET Framework 4.7.1/4.7.2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.6/4.6.1/4.6.2, .NET Core 2.2, Microsoft .NET Framework 4.7.2.","aliases":["GHSA-2xjx-v99w-gqf3"],"modified":"2026-03-14T09:30:40.024936Z","published":"2019-01-08T21:29:00.580Z","references":[{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/106405"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2019:0040"},{"type":"FIX","url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0545"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dotnet/core","events":[{"introduced":"0"},{"last_affected":"db80d23845503f74f69f84c3d525d9e3ea1e4811"},{"introduced":"0"},{"last_affected":"e7dd0cd3ff917f087f7af2163006d7df6827438b"},{"introduced":"0"},{"last_affected":"babd93cbba8eef59a323d66d2f9b63131b81408b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.0-sp2"},{"introduced":"0"},{"last_affected":"2.1"},{"introduced":"0"},{"last_affected":"2.2"}]}}],"versions":["v1.0.0","v1.0.0-rc1","v1.0.0-rc2","v1.0.1","v1.0.10","v1.0.11","v1.0.12","v1.0.13","v1.0.14","v1.0.15","v1.0.16","v1.0.2","v1.0.3","v1.0.4","v1.0.5","v1.0.7","v1.0.8","v1.0.9","v1.1","v1.1.0","v1.1.0-preview1","v1.1.1","v1.1.10","v1.1.11","v1.1.12","v1.1.13","v1.1.2","v1.1.4","v1.1.5","v1.1.6","v1.1.7","v1.1.8","v1.1.9","v2.0.0","v2.0.0-preview1","v2.0.0-preview2","v2.0.3","v2.0.4","v2.0.5","v2.0.6","v2.0.7","v2.0.7-2","v2.0.9","v2.1-preview1","v2.1-preview2","v2.1-rc1","v2.1.0","v2.1.1","v2.1.11","v2.1.12","v2.1.13","v2.1.14","v2.1.2","v2.1.3","v2.1.4","v2.1.5","v2.1.6","v2.1.7","v2.1.8","v2.1.9","v2.2.0","v2.2.0-preview1","v2.2.0-preview2","v2.2.0-preview3","v2.2.1","v2.2.2","v2.2.3","v2.2.5","v2.2.6","v2.2.7","v2.2.8","v3.0.0","v3.0.0-preview1","v3.0.0-preview2","v3.0.0-preview3","v3.0.0-preview4","v3.0.0-preview5","v3.0.0-preview6","v3.0.0-preview7","v3.0.0-preview8","v3.0.0-preview9","v3.0.0-rc1","v3.0.1","v3.0.2","v3.1.0","v3.1.0-preview1","v3.1.0-preview2","v3.1.0-preview3","v3.1.1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.0-sp2"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5"}]},{"events":[{"introduced":"0"},{"last_affected":"3.5.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.5.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.6.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.6"}]},{"events":[{"introduced":"0"},{"last_affected":"4.6.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.6.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.2"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.1"}]},{"events":[{"introduced":"0"},{"last_affected":"4.7.2"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-0545.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}