"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-04-11 20:01:12 +00:00
parent 9d05477a80
commit 20f6a08bb5
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
96 changed files with 69 additions and 375 deletions

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Visual Studio Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Visual Studio Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Visual Studio Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Visual Studio Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "HTTP.sys Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "HTTP.sys Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "NT OS Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "NT OS Kernel Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Fax Service Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Fax Service Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows iSCSI Discovery Service Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Windows iSCSI Discovery Service Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows iSCSI Service Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Windows iSCSI Service Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Azure Data Box Gateway Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Azure Data Box Gateway Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"

View File

@ -113,7 +113,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22000.1413"
"version_value": "10.0.22621.1413"
}
]
}

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Publisher Security Features Bypass Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Publisher Security Features Bypass Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Word Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Word Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SharePoint Server Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft SharePoint Server Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Tampering Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Tampering Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft OneNote Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft OneNote Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": ".NET Framework Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": ".NET Framework Denial of Service Vulnerability"
@ -190,8 +186,8 @@
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 4.4,
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C"
"baseScore": 5,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C"
}
]
}

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability"
@ -70,8 +66,8 @@
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 8.3,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C"
"baseScore": 8,
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C"
}
]
}

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Installer Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Installer Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Bluetooth Driver Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Bluetooth Driver Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Defender Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Defender Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Office for Android Spoofing Vulnerability"
},
{
"lang": "eng",
"value": "Office for Android Spoofing Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "HTTP Protocol Stack Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "HTTP Protocol Stack Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows BrokerInfrastructure Service Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows BrokerInfrastructure Service Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SharePoint Server Spoofing Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft SharePoint Server Spoofing Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Excel Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Excel Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Outlook Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Outlook Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Excel Spoofing Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Excel Spoofing Vulnerability"

View File

@ -121,11 +121,6 @@
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23399",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23399"
},
{
"url": "http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html"
}
]
},

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows DNS Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows DNS Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Media Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Media Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Media Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Media Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability"

View File

@ -12,10 +12,6 @@
{
"lang": "eng",
"value": "Azure Apache Ambari\u00a0Spoofing Vulnerability"
},
{
"lang": "eng",
"value": "Azure Apache Ambari Spoofing Vulnerability"
}
]
},

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows HTTP.sys Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows HTTP.sys Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Hyper-V Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Windows Hyper-V Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Accounts Picture Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Accounts Picture Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Cryptographic Services Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Cryptographic Services Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability"

View File

@ -231,11 +231,6 @@
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420"
},
{
"url": "http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html"
}
]
},

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Kernel Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Kernel Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Kernel Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"

View File

@ -1,17 +1,73 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-24860",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Microsoft Defender Denial of Service Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Microsoft Malware Protection Engine",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.1.0.0",
"version_value": "1.1.20200.4"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24860",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24860"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C"
}
]
}

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Secure Channel Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Windows Secure Channel Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"

View File

@ -113,7 +113,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.1413"
"version_value": "10.0.22000.1413"
}
]
}

View File

@ -113,7 +113,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.1413"
"version_value": "10.0.22000.1413"
}
]
}

View File

@ -113,7 +113,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.1413"
"version_value": "10.0.22000.1413"
}
]
}

View File

@ -113,7 +113,7 @@
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.1413"
"version_value": "10.0.22000.1413"
}
]
}