mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-30 18:04:30 +00:00
131 lines
3.4 KiB
JSON
131 lines
3.4 KiB
JSON
![]() |
{
|
||
|
"data_type": "CVE",
|
||
|
"data_format": "MITRE",
|
||
|
"data_version": "4.0",
|
||
|
"CVE_data_meta": {
|
||
|
"ASSIGNER": "secure@microsoft.com",
|
||
|
"ID": "CVE-2020-1466",
|
||
|
"STATE": "PUBLIC"
|
||
|
},
|
||
|
"affects": {
|
||
|
"vendor": {
|
||
|
"vendor_data": [
|
||
|
{
|
||
|
"product": {
|
||
|
"product_data": [
|
||
|
{
|
||
|
"product_name": "Windows Server 2019",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": ""
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
{
|
||
|
"product_name": "Windows Server 2019 (Server Core installation)",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": ""
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
{
|
||
|
"product_name": "Windows Server 2016",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": ""
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
{
|
||
|
"product_name": "Windows Server 2016 (Server Core installation)",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": ""
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
{
|
||
|
"product_name": "Windows Server 2012",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": ""
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
{
|
||
|
"product_name": "Windows Server 2012 (Server Core installation)",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": ""
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
{
|
||
|
"product_name": "Windows Server 2012 R2",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": ""
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
{
|
||
|
"product_name": "Windows Server 2012 R2 (Server Core installation)",
|
||
|
"version": {
|
||
|
"version_data": [
|
||
|
{
|
||
|
"version_value": ""
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"vendor_name": "Microsoft"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
},
|
||
|
"description": {
|
||
|
"description_data": [
|
||
|
{
|
||
|
"lang": "eng",
|
||
|
"value": "A denial of service vulnerability exists in Windows Remote Desktop Gateway (RD Gateway) when an attacker connects to the target system using RDP and sends specially crafted requests, aka \u0027Windows Remote Desktop Gateway (RD Gateway) Denial of Service Vulnerability\u0027."
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"problemtype": {
|
||
|
"problemtype_data": [
|
||
|
{
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "eng",
|
||
|
"value": "Denial of Service"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"references": {
|
||
|
"reference_data": [
|
||
|
{
|
||
|
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1466"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
}
|