diff --git a/2023/21xxx/CVE-2023-21566.json b/2023/21xxx/CVE-2023-21566.json index 29e95e9d693..2569f42a675 100644 --- a/2023/21xxx/CVE-2023-21566.json +++ b/2023/21xxx/CVE-2023-21566.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Visual Studio Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Visual Studio Elevation of Privilege Vulnerability" diff --git a/2023/21xxx/CVE-2023-21567.json b/2023/21xxx/CVE-2023-21567.json index 6f10b059e5f..fea88fd28b0 100644 --- a/2023/21xxx/CVE-2023-21567.json +++ b/2023/21xxx/CVE-2023-21567.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Visual Studio Denial of Service Vulnerability" - }, { "lang": "eng", "value": "Visual Studio Denial of Service Vulnerability" diff --git a/2023/21xxx/CVE-2023-21568.json b/2023/21xxx/CVE-2023-21568.json index 1e31680d025..5d8c6e99cbc 100644 --- a/2023/21xxx/CVE-2023-21568.json +++ b/2023/21xxx/CVE-2023-21568.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft SQL Server Integration Service (VS extension) Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21570.json b/2023/21xxx/CVE-2023-21570.json index 43c5fa03385..cc1078a02fc 100644 --- a/2023/21xxx/CVE-2023-21570.json +++ b/2023/21xxx/CVE-2023-21570.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" - }, { "lang": "eng", "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" diff --git a/2023/21xxx/CVE-2023-21571.json b/2023/21xxx/CVE-2023-21571.json index 762b2c2dc3d..56ced7ece2d 100644 --- a/2023/21xxx/CVE-2023-21571.json +++ b/2023/21xxx/CVE-2023-21571.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" - }, { "lang": "eng", "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" diff --git a/2023/21xxx/CVE-2023-21572.json b/2023/21xxx/CVE-2023-21572.json index 55d7b2bc08a..0d0170cd985 100644 --- a/2023/21xxx/CVE-2023-21572.json +++ b/2023/21xxx/CVE-2023-21572.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" - }, { "lang": "eng", "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" diff --git a/2023/21xxx/CVE-2023-21573.json b/2023/21xxx/CVE-2023-21573.json index b3342d7d43c..5e057f978ef 100644 --- a/2023/21xxx/CVE-2023-21573.json +++ b/2023/21xxx/CVE-2023-21573.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" - }, { "lang": "eng", "value": "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability" diff --git a/2023/21xxx/CVE-2023-21684.json b/2023/21xxx/CVE-2023-21684.json index b3d03d613c2..e4b772f02d4 100644 --- a/2023/21xxx/CVE-2023-21684.json +++ b/2023/21xxx/CVE-2023-21684.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21685.json b/2023/21xxx/CVE-2023-21685.json index 5b69eabb36d..d1a806d2f95 100644 --- a/2023/21xxx/CVE-2023-21685.json +++ b/2023/21xxx/CVE-2023-21685.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21686.json b/2023/21xxx/CVE-2023-21686.json index 20485562edc..ee9f3b40661 100644 --- a/2023/21xxx/CVE-2023-21686.json +++ b/2023/21xxx/CVE-2023-21686.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21687.json b/2023/21xxx/CVE-2023-21687.json index af30dd03fe1..5a7eb5cbf3b 100644 --- a/2023/21xxx/CVE-2023-21687.json +++ b/2023/21xxx/CVE-2023-21687.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "HTTP.sys Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "HTTP.sys Information Disclosure Vulnerability" diff --git a/2023/21xxx/CVE-2023-21688.json b/2023/21xxx/CVE-2023-21688.json index 77f78259287..bcc6acaa49f 100644 --- a/2023/21xxx/CVE-2023-21688.json +++ b/2023/21xxx/CVE-2023-21688.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "NT OS Kernel Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "NT OS Kernel Elevation of Privilege Vulnerability" diff --git a/2023/21xxx/CVE-2023-21689.json b/2023/21xxx/CVE-2023-21689.json index c4da9b46193..375fb8eefac 100644 --- a/2023/21xxx/CVE-2023-21689.json +++ b/2023/21xxx/CVE-2023-21689.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21690.json b/2023/21xxx/CVE-2023-21690.json index 79267bc4d4b..5f2160e03be 100644 --- a/2023/21xxx/CVE-2023-21690.json +++ b/2023/21xxx/CVE-2023-21690.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21691.json b/2023/21xxx/CVE-2023-21691.json index ab6fadc029b..3de7ee4b850 100644 --- a/2023/21xxx/CVE-2023-21691.json +++ b/2023/21xxx/CVE-2023-21691.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Information Disclosure Vulnerability" diff --git a/2023/21xxx/CVE-2023-21692.json b/2023/21xxx/CVE-2023-21692.json index c4c2d101387..01fb5d1ae7e 100644 --- a/2023/21xxx/CVE-2023-21692.json +++ b/2023/21xxx/CVE-2023-21692.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21693.json b/2023/21xxx/CVE-2023-21693.json index f7b3f4542a8..ab8958fbcd7 100644 --- a/2023/21xxx/CVE-2023-21693.json +++ b/2023/21xxx/CVE-2023-21693.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" diff --git a/2023/21xxx/CVE-2023-21694.json b/2023/21xxx/CVE-2023-21694.json index 38c4d533f85..0549a8c5aa0 100644 --- a/2023/21xxx/CVE-2023-21694.json +++ b/2023/21xxx/CVE-2023-21694.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Fax Service Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Windows Fax Service Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21695.json b/2023/21xxx/CVE-2023-21695.json index c0183e149ab..df75eb7a995 100644 --- a/2023/21xxx/CVE-2023-21695.json +++ b/2023/21xxx/CVE-2023-21695.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21697.json b/2023/21xxx/CVE-2023-21697.json index f2ec5c11c13..4c0688e7135 100644 --- a/2023/21xxx/CVE-2023-21697.json +++ b/2023/21xxx/CVE-2023-21697.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability" diff --git a/2023/21xxx/CVE-2023-21699.json b/2023/21xxx/CVE-2023-21699.json index d62f7538e18..f228b0f2521 100644 --- a/2023/21xxx/CVE-2023-21699.json +++ b/2023/21xxx/CVE-2023-21699.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Windows Internet Storage Name Service (iSNS) Server Information Disclosure Vulnerability" diff --git a/2023/21xxx/CVE-2023-21700.json b/2023/21xxx/CVE-2023-21700.json index 2225de3795c..4448929af4b 100644 --- a/2023/21xxx/CVE-2023-21700.json +++ b/2023/21xxx/CVE-2023-21700.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows iSCSI Discovery Service Denial of Service Vulnerability" - }, { "lang": "eng", "value": "Windows iSCSI Discovery Service Denial of Service Vulnerability" diff --git a/2023/21xxx/CVE-2023-21701.json b/2023/21xxx/CVE-2023-21701.json index b9c8a45f2a9..db4b83e71b9 100644 --- a/2023/21xxx/CVE-2023-21701.json +++ b/2023/21xxx/CVE-2023-21701.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability" - }, { "lang": "eng", "value": "Microsoft Protected Extensible Authentication Protocol (PEAP) Denial of Service Vulnerability" diff --git a/2023/21xxx/CVE-2023-21702.json b/2023/21xxx/CVE-2023-21702.json index 5bb4cad8c7e..f74d2a537be 100644 --- a/2023/21xxx/CVE-2023-21702.json +++ b/2023/21xxx/CVE-2023-21702.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows iSCSI Service Denial of Service Vulnerability" - }, { "lang": "eng", "value": "Windows iSCSI Service Denial of Service Vulnerability" diff --git a/2023/21xxx/CVE-2023-21703.json b/2023/21xxx/CVE-2023-21703.json index ff7c01462ee..754697ef3b1 100644 --- a/2023/21xxx/CVE-2023-21703.json +++ b/2023/21xxx/CVE-2023-21703.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Azure Data Box Gateway Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Azure Data Box Gateway Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21704.json b/2023/21xxx/CVE-2023-21704.json index df526f81338..1406ccbf771 100644 --- a/2023/21xxx/CVE-2023-21704.json +++ b/2023/21xxx/CVE-2023-21704.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft ODBC Driver for SQL Server Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21705.json b/2023/21xxx/CVE-2023-21705.json index bd80e72355a..21acb79c721 100644 --- a/2023/21xxx/CVE-2023-21705.json +++ b/2023/21xxx/CVE-2023-21705.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft SQL Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft SQL Server Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21706.json b/2023/21xxx/CVE-2023-21706.json index 9e983cd85a4..d15548e3440 100644 --- a/2023/21xxx/CVE-2023-21706.json +++ b/2023/21xxx/CVE-2023-21706.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft Exchange Server Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21707.json b/2023/21xxx/CVE-2023-21707.json index 0f0f3e54f16..23da0f48751 100644 --- a/2023/21xxx/CVE-2023-21707.json +++ b/2023/21xxx/CVE-2023-21707.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft Exchange Server Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21708.json b/2023/21xxx/CVE-2023-21708.json index 49cf41bf0cb..3f1fdc27ded 100644 --- a/2023/21xxx/CVE-2023-21708.json +++ b/2023/21xxx/CVE-2023-21708.json @@ -113,7 +113,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22000.1413" + "version_value": "10.0.22621.1413" } ] } diff --git a/2023/21xxx/CVE-2023-21710.json b/2023/21xxx/CVE-2023-21710.json index 8278a93db02..8523c751496 100644 --- a/2023/21xxx/CVE-2023-21710.json +++ b/2023/21xxx/CVE-2023-21710.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Exchange Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft Exchange Server Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21713.json b/2023/21xxx/CVE-2023-21713.json index aee71270b22..08397d98641 100644 --- a/2023/21xxx/CVE-2023-21713.json +++ b/2023/21xxx/CVE-2023-21713.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft SQL Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft SQL Server Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21714.json b/2023/21xxx/CVE-2023-21714.json index 5f064bb495f..01f1e405011 100644 --- a/2023/21xxx/CVE-2023-21714.json +++ b/2023/21xxx/CVE-2023-21714.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Office Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Microsoft Office Information Disclosure Vulnerability" diff --git a/2023/21xxx/CVE-2023-21715.json b/2023/21xxx/CVE-2023-21715.json index d7174d2d333..9b19c678de2 100644 --- a/2023/21xxx/CVE-2023-21715.json +++ b/2023/21xxx/CVE-2023-21715.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Publisher Security Features Bypass Vulnerability" - }, { "lang": "eng", "value": "Microsoft Publisher Security Features Bypass Vulnerability" diff --git a/2023/21xxx/CVE-2023-21716.json b/2023/21xxx/CVE-2023-21716.json index 5968383dd43..d002741917f 100644 --- a/2023/21xxx/CVE-2023-21716.json +++ b/2023/21xxx/CVE-2023-21716.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Word Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft Word Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21717.json b/2023/21xxx/CVE-2023-21717.json index 4954c118b05..fc88503d613 100644 --- a/2023/21xxx/CVE-2023-21717.json +++ b/2023/21xxx/CVE-2023-21717.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft SharePoint Server Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Microsoft SharePoint Server Elevation of Privilege Vulnerability" diff --git a/2023/21xxx/CVE-2023-21720.json b/2023/21xxx/CVE-2023-21720.json index cc0e32935d1..27d8522a764 100644 --- a/2023/21xxx/CVE-2023-21720.json +++ b/2023/21xxx/CVE-2023-21720.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Edge (Chromium-based) Tampering Vulnerability" - }, { "lang": "eng", "value": "Microsoft Edge (Chromium-based) Tampering Vulnerability" diff --git a/2023/21xxx/CVE-2023-21721.json b/2023/21xxx/CVE-2023-21721.json index 1a4aef9e3f1..7efbbbca7df 100644 --- a/2023/21xxx/CVE-2023-21721.json +++ b/2023/21xxx/CVE-2023-21721.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft OneNote Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Microsoft OneNote Elevation of Privilege Vulnerability" diff --git a/2023/21xxx/CVE-2023-21722.json b/2023/21xxx/CVE-2023-21722.json index 908c42f41ee..564f8108aa0 100644 --- a/2023/21xxx/CVE-2023-21722.json +++ b/2023/21xxx/CVE-2023-21722.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": ".NET Framework Denial of Service Vulnerability" - }, { "lang": "eng", "value": ".NET Framework Denial of Service Vulnerability" @@ -190,8 +186,8 @@ { "version": "3.1", "baseSeverity": "HIGH", - "baseScore": 4.4, - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C" + "baseScore": 5, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C" } ] } diff --git a/2023/21xxx/CVE-2023-21777.json b/2023/21xxx/CVE-2023-21777.json index cbd28197e46..d062b9dea41 100644 --- a/2023/21xxx/CVE-2023-21777.json +++ b/2023/21xxx/CVE-2023-21777.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability" diff --git a/2023/21xxx/CVE-2023-21778.json b/2023/21xxx/CVE-2023-21778.json index cc2fa33a768..e54dd6e0d4b 100644 --- a/2023/21xxx/CVE-2023-21778.json +++ b/2023/21xxx/CVE-2023-21778.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability" @@ -70,8 +66,8 @@ { "version": "3.1", "baseSeverity": "HIGH", - "baseScore": 8.3, - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C" + "baseScore": 8, + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C" } ] } diff --git a/2023/21xxx/CVE-2023-21794.json b/2023/21xxx/CVE-2023-21794.json index 33e3fef57d0..6ed1536040f 100644 --- a/2023/21xxx/CVE-2023-21794.json +++ b/2023/21xxx/CVE-2023-21794.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability" - }, { "lang": "eng", "value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability" diff --git a/2023/21xxx/CVE-2023-21797.json b/2023/21xxx/CVE-2023-21797.json index 7b29eaf142f..f6224a68955 100644 --- a/2023/21xxx/CVE-2023-21797.json +++ b/2023/21xxx/CVE-2023-21797.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft ODBC Driver Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft ODBC Driver Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21798.json b/2023/21xxx/CVE-2023-21798.json index ba5bb1d6c8b..76d86e8a6e9 100644 --- a/2023/21xxx/CVE-2023-21798.json +++ b/2023/21xxx/CVE-2023-21798.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft ODBC Driver Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft ODBC Driver Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21799.json b/2023/21xxx/CVE-2023-21799.json index 9063e95620a..8b6af763a26 100644 --- a/2023/21xxx/CVE-2023-21799.json +++ b/2023/21xxx/CVE-2023-21799.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability" diff --git a/2023/21xxx/CVE-2023-21800.json b/2023/21xxx/CVE-2023-21800.json index b71cafaa678..c980cbfc227 100644 --- a/2023/21xxx/CVE-2023-21800.json +++ b/2023/21xxx/CVE-2023-21800.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Installer Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Installer Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23388.json b/2023/23xxx/CVE-2023-23388.json index 3509413121e..4402ab3e0cf 100644 --- a/2023/23xxx/CVE-2023-23388.json +++ b/2023/23xxx/CVE-2023-23388.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Bluetooth Driver Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Bluetooth Driver Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23389.json b/2023/23xxx/CVE-2023-23389.json index 0b007b3dc17..02fa5d40425 100644 --- a/2023/23xxx/CVE-2023-23389.json +++ b/2023/23xxx/CVE-2023-23389.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Defender Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Microsoft Defender Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23391.json b/2023/23xxx/CVE-2023-23391.json index f200d08b4b6..d3943ca9bed 100644 --- a/2023/23xxx/CVE-2023-23391.json +++ b/2023/23xxx/CVE-2023-23391.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Office for Android Spoofing Vulnerability" - }, { "lang": "eng", "value": "Office for Android Spoofing Vulnerability" diff --git a/2023/23xxx/CVE-2023-23392.json b/2023/23xxx/CVE-2023-23392.json index 289b9a0299d..306a2c626bb 100644 --- a/2023/23xxx/CVE-2023-23392.json +++ b/2023/23xxx/CVE-2023-23392.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "HTTP Protocol Stack Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "HTTP Protocol Stack Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23393.json b/2023/23xxx/CVE-2023-23393.json index e6d47c8a2fd..6af8f908f41 100644 --- a/2023/23xxx/CVE-2023-23393.json +++ b/2023/23xxx/CVE-2023-23393.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows BrokerInfrastructure Service Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows BrokerInfrastructure Service Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23394.json b/2023/23xxx/CVE-2023-23394.json index a310ce941b6..a9807d0450f 100644 --- a/2023/23xxx/CVE-2023-23394.json +++ b/2023/23xxx/CVE-2023-23394.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability" diff --git a/2023/23xxx/CVE-2023-23395.json b/2023/23xxx/CVE-2023-23395.json index 20bee8160e5..73f4d302947 100644 --- a/2023/23xxx/CVE-2023-23395.json +++ b/2023/23xxx/CVE-2023-23395.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft SharePoint Server Spoofing Vulnerability" - }, { "lang": "eng", "value": "Microsoft SharePoint Server Spoofing Vulnerability" diff --git a/2023/23xxx/CVE-2023-23396.json b/2023/23xxx/CVE-2023-23396.json index 5f04cd34466..8c2f5ed57ea 100644 --- a/2023/23xxx/CVE-2023-23396.json +++ b/2023/23xxx/CVE-2023-23396.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Excel Denial of Service Vulnerability" - }, { "lang": "eng", "value": "Microsoft Excel Denial of Service Vulnerability" diff --git a/2023/23xxx/CVE-2023-23397.json b/2023/23xxx/CVE-2023-23397.json index c39a3c2168c..22cd7c27ea2 100644 --- a/2023/23xxx/CVE-2023-23397.json +++ b/2023/23xxx/CVE-2023-23397.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Outlook Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Microsoft Outlook Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23398.json b/2023/23xxx/CVE-2023-23398.json index d022bde9e2b..3eb99a10eaf 100644 --- a/2023/23xxx/CVE-2023-23398.json +++ b/2023/23xxx/CVE-2023-23398.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft Excel Spoofing Vulnerability" - }, { "lang": "eng", "value": "Microsoft Excel Spoofing Vulnerability" diff --git a/2023/23xxx/CVE-2023-23399.json b/2023/23xxx/CVE-2023-23399.json index d34b060dbb6..6d93fb9327f 100644 --- a/2023/23xxx/CVE-2023-23399.json +++ b/2023/23xxx/CVE-2023-23399.json @@ -121,11 +121,6 @@ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23399", "refsource": "MISC", "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23399" - }, - { - "url": "http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html", - "refsource": "MISC", - "name": "http://packetstormsecurity.com/files/171767/Microsoft-Excel-365-MSO-2302-Build-16.0.16130.20186-Remote-Code-Execution.html" } ] }, diff --git a/2023/23xxx/CVE-2023-23400.json b/2023/23xxx/CVE-2023-23400.json index a9a27d7f511..fce0d29ce8e 100644 --- a/2023/23xxx/CVE-2023-23400.json +++ b/2023/23xxx/CVE-2023-23400.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows DNS Server Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Windows DNS Server Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23401.json b/2023/23xxx/CVE-2023-23401.json index 8746d73bebd..b7e629ce04e 100644 --- a/2023/23xxx/CVE-2023-23401.json +++ b/2023/23xxx/CVE-2023-23401.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Media Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Windows Media Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23402.json b/2023/23xxx/CVE-2023-23402.json index 5967d7e00c4..3a0f132d1fb 100644 --- a/2023/23xxx/CVE-2023-23402.json +++ b/2023/23xxx/CVE-2023-23402.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Media Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Windows Media Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23403.json b/2023/23xxx/CVE-2023-23403.json index e0719a65a53..b721674ef1e 100644 --- a/2023/23xxx/CVE-2023-23403.json +++ b/2023/23xxx/CVE-2023-23403.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23404.json b/2023/23xxx/CVE-2023-23404.json index a8c2813decd..b7b4772d788 100644 --- a/2023/23xxx/CVE-2023-23404.json +++ b/2023/23xxx/CVE-2023-23404.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23405.json b/2023/23xxx/CVE-2023-23405.json index a61d5f5fd13..89af285e788 100644 --- a/2023/23xxx/CVE-2023-23405.json +++ b/2023/23xxx/CVE-2023-23405.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23406.json b/2023/23xxx/CVE-2023-23406.json index e67018d17b9..2260ae82574 100644 --- a/2023/23xxx/CVE-2023-23406.json +++ b/2023/23xxx/CVE-2023-23406.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23407.json b/2023/23xxx/CVE-2023-23407.json index 5f1c7bd1b05..14c134406a7 100644 --- a/2023/23xxx/CVE-2023-23407.json +++ b/2023/23xxx/CVE-2023-23407.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23408.json b/2023/23xxx/CVE-2023-23408.json index 799cd5e5211..6fda45bf509 100644 --- a/2023/23xxx/CVE-2023-23408.json +++ b/2023/23xxx/CVE-2023-23408.json @@ -12,10 +12,6 @@ { "lang": "eng", "value": "Azure Apache Ambari\u00a0Spoofing Vulnerability" - }, - { - "lang": "eng", - "value": "Azure Apache Ambari Spoofing Vulnerability" } ] }, diff --git a/2023/23xxx/CVE-2023-23409.json b/2023/23xxx/CVE-2023-23409.json index c229ec9c49a..136eca20d4b 100644 --- a/2023/23xxx/CVE-2023-23409.json +++ b/2023/23xxx/CVE-2023-23409.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability" diff --git a/2023/23xxx/CVE-2023-23410.json b/2023/23xxx/CVE-2023-23410.json index ba920f57883..d8e32fa9aeb 100644 --- a/2023/23xxx/CVE-2023-23410.json +++ b/2023/23xxx/CVE-2023-23410.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows HTTP.sys Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows HTTP.sys Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23411.json b/2023/23xxx/CVE-2023-23411.json index a185c96cb55..9c33df060d4 100644 --- a/2023/23xxx/CVE-2023-23411.json +++ b/2023/23xxx/CVE-2023-23411.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Hyper-V Denial of Service Vulnerability" - }, { "lang": "eng", "value": "Windows Hyper-V Denial of Service Vulnerability" diff --git a/2023/23xxx/CVE-2023-23412.json b/2023/23xxx/CVE-2023-23412.json index fec7c7ba4c9..5430e06af19 100644 --- a/2023/23xxx/CVE-2023-23412.json +++ b/2023/23xxx/CVE-2023-23412.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Accounts Picture Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Accounts Picture Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23413.json b/2023/23xxx/CVE-2023-23413.json index 61ca5a5c1e1..914f8255911 100644 --- a/2023/23xxx/CVE-2023-23413.json +++ b/2023/23xxx/CVE-2023-23413.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23414.json b/2023/23xxx/CVE-2023-23414.json index 351c9ccc4a4..0e74c215306 100644 --- a/2023/23xxx/CVE-2023-23414.json +++ b/2023/23xxx/CVE-2023-23414.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23415.json b/2023/23xxx/CVE-2023-23415.json index e5f8adc916e..65b1f9dc134 100644 --- a/2023/23xxx/CVE-2023-23415.json +++ b/2023/23xxx/CVE-2023-23415.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23416.json b/2023/23xxx/CVE-2023-23416.json index 7e0af2686f5..558f74e1dd9 100644 --- a/2023/23xxx/CVE-2023-23416.json +++ b/2023/23xxx/CVE-2023-23416.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Cryptographic Services Remote Code Execution Vulnerability" - }, { "lang": "eng", "value": "Windows Cryptographic Services Remote Code Execution Vulnerability" diff --git a/2023/23xxx/CVE-2023-23417.json b/2023/23xxx/CVE-2023-23417.json index bfd16d4ed59..a9500b11517 100644 --- a/2023/23xxx/CVE-2023-23417.json +++ b/2023/23xxx/CVE-2023-23417.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Partition Management Driver Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Partition Management Driver Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23418.json b/2023/23xxx/CVE-2023-23418.json index 0a645d0ce3f..1b69d139a4f 100644 --- a/2023/23xxx/CVE-2023-23418.json +++ b/2023/23xxx/CVE-2023-23418.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23419.json b/2023/23xxx/CVE-2023-23419.json index 6ba05d87f6b..07578585759 100644 --- a/2023/23xxx/CVE-2023-23419.json +++ b/2023/23xxx/CVE-2023-23419.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23420.json b/2023/23xxx/CVE-2023-23420.json index e8997d51859..2afd0b51c54 100644 --- a/2023/23xxx/CVE-2023-23420.json +++ b/2023/23xxx/CVE-2023-23420.json @@ -231,11 +231,6 @@ "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420", "refsource": "MISC", "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23420" - }, - { - "url": "http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html", - "refsource": "MISC", - "name": "http://packetstormsecurity.com/files/171794/Windows-Kernel-Registry-Key-Issue.html" } ] }, diff --git a/2023/23xxx/CVE-2023-23421.json b/2023/23xxx/CVE-2023-23421.json index f25a8206b63..374f5bf3d75 100644 --- a/2023/23xxx/CVE-2023-23421.json +++ b/2023/23xxx/CVE-2023-23421.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Kernel Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Kernel Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23422.json b/2023/23xxx/CVE-2023-23422.json index 44ceed1d566..55da8445d9d 100644 --- a/2023/23xxx/CVE-2023-23422.json +++ b/2023/23xxx/CVE-2023-23422.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Kernel Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Kernel Elevation of Privilege Vulnerability" diff --git a/2023/23xxx/CVE-2023-23423.json b/2023/23xxx/CVE-2023-23423.json index c56bf2a895a..20c88889af4 100644 --- a/2023/23xxx/CVE-2023-23423.json +++ b/2023/23xxx/CVE-2023-23423.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Kernel Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Kernel Elevation of Privilege Vulnerability" diff --git a/2023/24xxx/CVE-2023-24856.json b/2023/24xxx/CVE-2023-24856.json index 26f785968b4..800b8b11a9e 100644 --- a/2023/24xxx/CVE-2023-24856.json +++ b/2023/24xxx/CVE-2023-24856.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" diff --git a/2023/24xxx/CVE-2023-24857.json b/2023/24xxx/CVE-2023-24857.json index 64b9ca5510e..ebdc0007d6c 100644 --- a/2023/24xxx/CVE-2023-24857.json +++ b/2023/24xxx/CVE-2023-24857.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" diff --git a/2023/24xxx/CVE-2023-24858.json b/2023/24xxx/CVE-2023-24858.json index 528494e3b7c..06572aa2906 100644 --- a/2023/24xxx/CVE-2023-24858.json +++ b/2023/24xxx/CVE-2023-24858.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" diff --git a/2023/24xxx/CVE-2023-24859.json b/2023/24xxx/CVE-2023-24859.json index bf81059af95..b28ab6f77e8 100644 --- a/2023/24xxx/CVE-2023-24859.json +++ b/2023/24xxx/CVE-2023-24859.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability" - }, { "lang": "eng", "value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability" diff --git a/2023/24xxx/CVE-2023-24860.json b/2023/24xxx/CVE-2023-24860.json index 718f19d1d51..4b62ead44ea 100644 --- a/2023/24xxx/CVE-2023-24860.json +++ b/2023/24xxx/CVE-2023-24860.json @@ -1,17 +1,73 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-24860", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "secure@microsoft.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Microsoft Defender Denial of Service Vulnerability" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Denial of Service" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Microsoft", + "product": { + "product_data": [ + { + "product_name": "Microsoft Malware Protection Engine", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "1.1.0.0", + "version_value": "1.1.20200.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24860", + "refsource": "MISC", + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24860" + } + ] + }, + "impact": { + "cvss": [ + { + "version": "3.1", + "baseSeverity": "HIGH", + "baseScore": 7.5, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C" } ] } diff --git a/2023/24xxx/CVE-2023-24861.json b/2023/24xxx/CVE-2023-24861.json index b678eebf822..91d7331715f 100644 --- a/2023/24xxx/CVE-2023-24861.json +++ b/2023/24xxx/CVE-2023-24861.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Graphics Component Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Windows Graphics Component Elevation of Privilege Vulnerability" diff --git a/2023/24xxx/CVE-2023-24862.json b/2023/24xxx/CVE-2023-24862.json index 66d6e822efc..ac9a5232217 100644 --- a/2023/24xxx/CVE-2023-24862.json +++ b/2023/24xxx/CVE-2023-24862.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Windows Secure Channel Denial of Service Vulnerability" - }, { "lang": "eng", "value": "Windows Secure Channel Denial of Service Vulnerability" diff --git a/2023/24xxx/CVE-2023-24863.json b/2023/24xxx/CVE-2023-24863.json index 23fd7375165..14ea80a1245 100644 --- a/2023/24xxx/CVE-2023-24863.json +++ b/2023/24xxx/CVE-2023-24863.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" diff --git a/2023/24xxx/CVE-2023-24864.json b/2023/24xxx/CVE-2023-24864.json index b536819fc6e..018fd1ccd38 100644 --- a/2023/24xxx/CVE-2023-24864.json +++ b/2023/24xxx/CVE-2023-24864.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability" diff --git a/2023/24xxx/CVE-2023-24865.json b/2023/24xxx/CVE-2023-24865.json index 0ab2e751d58..bd320a5ad91 100644 --- a/2023/24xxx/CVE-2023-24865.json +++ b/2023/24xxx/CVE-2023-24865.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" diff --git a/2023/24xxx/CVE-2023-24866.json b/2023/24xxx/CVE-2023-24866.json index 2dcd95e32ae..d4c83da789d 100644 --- a/2023/24xxx/CVE-2023-24866.json +++ b/2023/24xxx/CVE-2023-24866.json @@ -9,10 +9,6 @@ }, "description": { "description_data": [ - { - "lang": "eng", - "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" - }, { "lang": "eng", "value": "Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability" diff --git a/2023/24xxx/CVE-2023-24867.json b/2023/24xxx/CVE-2023-24867.json index a3c0d223d7f..bdc3361fa05 100644 --- a/2023/24xxx/CVE-2023-24867.json +++ b/2023/24xxx/CVE-2023-24867.json @@ -113,7 +113,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.1413" + "version_value": "10.0.22000.1413" } ] } diff --git a/2023/24xxx/CVE-2023-24868.json b/2023/24xxx/CVE-2023-24868.json index 9b5c8054ce5..ef20a939834 100644 --- a/2023/24xxx/CVE-2023-24868.json +++ b/2023/24xxx/CVE-2023-24868.json @@ -113,7 +113,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.1413" + "version_value": "10.0.22000.1413" } ] } diff --git a/2023/24xxx/CVE-2023-24869.json b/2023/24xxx/CVE-2023-24869.json index 8b9d56a77b4..fcc2545b47b 100644 --- a/2023/24xxx/CVE-2023-24869.json +++ b/2023/24xxx/CVE-2023-24869.json @@ -113,7 +113,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.1413" + "version_value": "10.0.22000.1413" } ] } diff --git a/2023/24xxx/CVE-2023-24870.json b/2023/24xxx/CVE-2023-24870.json index b96237043f8..bf650114b06 100644 --- a/2023/24xxx/CVE-2023-24870.json +++ b/2023/24xxx/CVE-2023-24870.json @@ -113,7 +113,7 @@ { "version_affected": "<", "version_name": "10.0.0", - "version_value": "10.0.22621.1413" + "version_value": "10.0.22000.1413" } ] }