mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-05-08 11:37:04 +00:00
"-Synchronized-Data."
This commit is contained in:
parent
9d05477a80
commit
20f6a08bb5
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Visual Studio Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Visual Studio Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Visual Studio Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Visual Studio Denial of Service Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "HTTP.sys Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "HTTP.sys Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "NT OS Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "NT OS Kernel Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Fax Service Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Fax Service Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows iSCSI Discovery Service Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows iSCSI Discovery Service Denial of Service Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows iSCSI Service Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows iSCSI Service Denial of Service Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Azure Data Box Gateway Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Azure Data Box Gateway Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||
|
@ -113,7 +113,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.22000.1413"
|
||||
"version_value": "10.0.22621.1413"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Office Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Office Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Publisher Security Features Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Publisher Security Features Bypass Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Word Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Word Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SharePoint Server Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SharePoint Server Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Edge (Chromium-based) Tampering Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Edge (Chromium-based) Tampering Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft OneNote Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft OneNote Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": ".NET Framework Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": ".NET Framework Denial of Service Vulnerability"
|
||||
@ -190,8 +186,8 @@
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseSeverity": "HIGH",
|
||||
"baseScore": 4.4,
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C"
|
||||
"baseScore": 5,
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability"
|
||||
@ -70,8 +66,8 @@
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseSeverity": "HIGH",
|
||||
"baseScore": 8.3,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C"
|
||||
"baseScore": 8,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Installer Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Installer Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Bluetooth Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Bluetooth Driver Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Defender Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Defender Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Office for Android Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Office for Android Spoofing Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "HTTP Protocol Stack Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "HTTP Protocol Stack Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows BrokerInfrastructure Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows BrokerInfrastructure Service Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SharePoint Server Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft SharePoint Server Spoofing Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Excel Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Excel Denial of Service Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Outlook Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Outlook Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Excel Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft Excel Spoofing Vulnerability"
|
||||
|
@ -121,11 +121,6 @@
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23399",
|
||||
"refsource": "MISC",
|
||||
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23399"
|
||||
},
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows DNS Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows DNS Server Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Media Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Media Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Media Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Media Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability"
|
||||
|
@ -12,10 +12,6 @@
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Azure Apache Ambari\u00a0Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Azure Apache Ambari Spoofing Vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows HTTP.sys Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows HTTP.sys Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Hyper-V Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Hyper-V Denial of Service Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Accounts Picture Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Accounts Picture Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Cryptographic Services Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Cryptographic Services Remote Code Execution Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability"
|
||||
|
@ -231,11 +231,6 @@
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420",
|
||||
"refsource": "MISC",
|
||||
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420"
|
||||
},
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html",
|
||||
"refsource": "MISC",
|
||||
"name": "http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
|
||||
|
@ -1,17 +1,73 @@
|
||||
{
|
||||
"data_version": "4.0",
|
||||
"data_type": "CVE",
|
||||
"data_format": "MITRE",
|
||||
"data_version": "4.0",
|
||||
"CVE_data_meta": {
|
||||
"ID": "CVE-2023-24860",
|
||||
"ASSIGNER": "cve@mitre.org",
|
||||
"STATE": "RESERVED"
|
||||
"ASSIGNER": "secure@microsoft.com",
|
||||
"STATE": "PUBLIC"
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
|
||||
"value": "Microsoft Defender Denial of Service Vulnerability"
|
||||
}
|
||||
]
|
||||
},
|
||||
"problemtype": {
|
||||
"problemtype_data": [
|
||||
{
|
||||
"description": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Denial of Service"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
"affects": {
|
||||
"vendor": {
|
||||
"vendor_data": [
|
||||
{
|
||||
"vendor_name": "Microsoft",
|
||||
"product": {
|
||||
"product_data": [
|
||||
{
|
||||
"product_name": "Microsoft Malware Protection Engine",
|
||||
"version": {
|
||||
"version_data": [
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "1.1.0.0",
|
||||
"version_value": "1.1.20200.4"
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
]
|
||||
}
|
||||
},
|
||||
"references": {
|
||||
"reference_data": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24860",
|
||||
"refsource": "MISC",
|
||||
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24860"
|
||||
}
|
||||
]
|
||||
},
|
||||
"impact": {
|
||||
"cvss": [
|
||||
{
|
||||
"version": "3.1",
|
||||
"baseSeverity": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Secure Channel Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Windows Secure Channel Denial of Service Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
|
@ -9,10 +9,6 @@
|
||||
},
|
||||
"description": {
|
||||
"description_data": [
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "eng",
|
||||
"value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability"
|
||||
|
@ -113,7 +113,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.22621.1413"
|
||||
"version_value": "10.0.22000.1413"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -113,7 +113,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.22621.1413"
|
||||
"version_value": "10.0.22000.1413"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -113,7 +113,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.22621.1413"
|
||||
"version_value": "10.0.22000.1413"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -113,7 +113,7 @@
|
||||
{
|
||||
"version_affected": "<",
|
||||
"version_name": "10.0.0",
|
||||
"version_value": "10.0.22621.1413"
|
||||
"version_value": "10.0.22000.1413"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
x
Reference in New Issue
Block a user