From 3c7e052d1b6588a3b714833b2e723f7fa6d92c74 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 2 Jan 2025 19:01:00 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2013/3xxx/CVE-2013-3900.json | 169 +++++++++++++++++++-------------- 2022/21xxx/CVE-2022-21957.json | 2 +- 2022/21xxx/CVE-2022-21965.json | 4 +- 2022/21xxx/CVE-2022-21972.json | 43 +++++---- 2022/21xxx/CVE-2022-21978.json | 4 +- 2022/22xxx/CVE-2022-22011.json | 41 ++++---- 2022/22xxx/CVE-2022-22012.json | 43 +++++---- 2022/22xxx/CVE-2022-22013.json | 43 +++++---- 2022/22xxx/CVE-2022-22014.json | 43 +++++---- 2022/22xxx/CVE-2022-22015.json | 37 ++++---- 2022/22xxx/CVE-2022-22016.json | 25 +++-- 2022/22xxx/CVE-2022-22017.json | 6 +- 2022/22xxx/CVE-2022-22019.json | 43 +++++---- 2022/22xxx/CVE-2022-22713.json | 6 +- 2022/23xxx/CVE-2022-23256.json | 4 +- 2022/23xxx/CVE-2022-23267.json | 19 +--- 2022/23xxx/CVE-2022-23270.json | 43 +++++---- 2022/23xxx/CVE-2022-23279.json | 8 +- 2022/24xxx/CVE-2022-24466.json | 20 ++-- 2022/24xxx/CVE-2022-24487.json | 21 ++-- 2022/24xxx/CVE-2022-24495.json | 21 ++-- 2022/24xxx/CVE-2022-24527.json | 4 +- 2022/26xxx/CVE-2022-26832.json | 4 +- 2022/26xxx/CVE-2022-26905.json | 9 +- 2022/26xxx/CVE-2022-26913.json | 17 ++-- 2022/26xxx/CVE-2022-26923.json | 29 +++--- 2022/26xxx/CVE-2022-26925.json | 43 +++++---- 2022/26xxx/CVE-2022-26926.json | 43 +++++---- 2022/26xxx/CVE-2022-26927.json | 17 ++-- 2022/26xxx/CVE-2022-26930.json | 33 ++++--- 2024/13xxx/CVE-2024-13124.json | 18 ++++ 2024/13xxx/CVE-2024-13125.json | 18 ++++ 2024/48xxx/CVE-2024-48197.json | 66 +++++++++++-- 2024/56xxx/CVE-2024-56831.json | 18 ++++ 2024/56xxx/CVE-2024-56832.json | 18 ++++ 2024/56xxx/CVE-2024-56833.json | 18 ++++ 2024/56xxx/CVE-2024-56834.json | 18 ++++ 2025/0xxx/CVE-2025-0174.json | 18 ++++ 2025/0xxx/CVE-2025-0175.json | 18 ++++ 2025/0xxx/CVE-2025-0176.json | 18 ++++ 2025/0xxx/CVE-2025-0177.json | 18 ++++ 41 files changed, 708 insertions(+), 382 deletions(-) create mode 100644 2024/13xxx/CVE-2024-13124.json create mode 100644 2024/13xxx/CVE-2024-13125.json create mode 100644 2024/56xxx/CVE-2024-56831.json create mode 100644 2024/56xxx/CVE-2024-56832.json create mode 100644 2024/56xxx/CVE-2024-56833.json create mode 100644 2024/56xxx/CVE-2024-56834.json create mode 100644 2025/0xxx/CVE-2025-0174.json create mode 100644 2025/0xxx/CVE-2025-0175.json create mode 100644 2025/0xxx/CVE-2025-0176.json create mode 100644 2025/0xxx/CVE-2025-0177.json diff --git a/2013/3xxx/CVE-2013-3900.json b/2013/3xxx/CVE-2013-3900.json index e79f0f3b581..cc9c8a4831d 100644 --- a/2013/3xxx/CVE-2013-3900.json +++ b/2013/3xxx/CVE-2013-3900.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Why is Microsoft republishing a CVE from 2013?\nWe are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, the information herein remains unchanged from the original text published on December 10, 2013.\nMicrosoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for Windows 10 and Windows 11, so no security update is required; however, the reg key must be set. See the Security Updates table for the list of affected software.\nVulnerability Description\nA remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add malicious code to the file without invalidating the signature. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nIf a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\nExploitation of this vulnerability requires that a user or application run or install a specially crafted, signed PE file. An attacker could modify an existing signed file to include malicious code without invalidating the signature. This code would... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900" + "value": "Why is Microsoft republishing a CVE from 2013?\nWe are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, except for clarifications about how to configure the EnableCertPaddingCheck registry value, the information herein remains unchanged from the original text published on December 10, 2013,\nMicrosoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for Windows 10 and Windows 11, so no security update is required; however, the reg key must be set. See the Security Updates table for the list of affected software.\nVulnerability Description\nA remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add malicious code to the file without invalidating the signature. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nIf a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\nExploitation of this vulnerability requires that a user or application run or install a specially crafted, signed PE file. An attacker could modify an... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900" } ] }, @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Security Feature Bypass" + "value": "CWE-347: Improper Verification of Cryptographic Signature", + "cweId": "CWE-347" } ] } @@ -38,6 +39,10 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + }, { "version_affected": "=", "version_value": "N/A" @@ -67,28 +72,6 @@ ] } }, - { - "product_name": "Windows 10 Version 1909", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "N/A" - } - ] - } - }, - { - "product_name": "Windows 10 Version 21H1", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "N/A" - } - ] - } - }, { "product_name": "Windows Server 2022", "version": { @@ -100,17 +83,6 @@ ] } }, - { - "product_name": "Windows 10 Version 20H2", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "N/A" - } - ] - } - }, { "product_name": "Windows 11 version 21H2", "version": { @@ -133,6 +105,94 @@ ] } }, + { + "product_name": "Windows 11 version 22H2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, + { + "product_name": "Windows 10 Version 22H2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, + { + "product_name": "Windows Server 2025 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, + { + "product_name": "Windows 11 version 22H3", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, + { + "product_name": "Windows 11 Version 23H2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, + { + "product_name": "Windows Server 2022, 23H2 Edition (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, + { + "product_name": "Windows 11 Version 24H2", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, + { + "product_name": "Windows Server 2025", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "N/A" + } + ] + } + }, { "product_name": "Windows 10 Version 1507", "version": { @@ -177,39 +237,6 @@ ] } }, - { - "product_name": "Windows 7", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "N/A" - } - ] - } - }, - { - "product_name": "Windows 7 Service Pack 1", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "N/A" - } - ] - } - }, - { - "product_name": "Windows 8.1", - "version": { - "version_data": [ - { - "version_affected": "=", - "version_value": "N/A" - } - ] - } - }, { "product_name": "Windows Server 2008 Service Pack 2", "version": { @@ -328,9 +355,9 @@ "cvss": [ { "version": "3.1", - "baseSeverity": "HIGH", - "baseScore": 7.4, - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N/E:U/RL:O/RC:C" + "baseSeverity": "MEDIUM", + "baseScore": 5.5, + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C" } ] } diff --git a/2022/21xxx/CVE-2022-21957.json b/2022/21xxx/CVE-2022-21957.json index a24c112a35d..c1a15bc6408 100644 --- a/2022/21xxx/CVE-2022-21957.json +++ b/2022/21xxx/CVE-2022-21957.json @@ -52,7 +52,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "9.1.0", + "version_name": "9.0", "version_value": "9.1.9.8" } ] diff --git a/2022/21xxx/CVE-2022-21965.json b/2022/21xxx/CVE-2022-21965.json index 959c4ceb2af..a8e2abfbbf1 100644 --- a/2022/21xxx/CVE-2022-21965.json +++ b/2022/21xxx/CVE-2022-21965.json @@ -79,9 +79,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21965", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21965", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21965" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21965" } ] }, diff --git a/2022/21xxx/CVE-2022-21972.json b/2022/21xxx/CVE-2022-21972.json index 212fa5610dd..05642efb4eb 100644 --- a/2022/21xxx/CVE-2022-21972.json +++ b/2022/21xxx/CVE-2022-21972.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -328,7 +333,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -340,7 +345,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -355,9 +360,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21972", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21972", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21972" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21972" } ] }, diff --git a/2022/21xxx/CVE-2022-21978.json b/2022/21xxx/CVE-2022-21978.json index 9583ac0eeca..0b54c1c34cd 100644 --- a/2022/21xxx/CVE-2022-21978.json +++ b/2022/21xxx/CVE-2022-21978.json @@ -103,9 +103,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21978", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21978", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21978" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21978" } ] }, diff --git a/2022/22xxx/CVE-2022-22011.json b/2022/22xxx/CVE-2022-22011.json index e2cb6ef2233..a2996f91b5b 100644 --- a/2022/22xxx/CVE-2022-22011.json +++ b/2022/22xxx/CVE-2022-22011.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -124,7 +129,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -136,7 +141,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -220,7 +225,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -232,7 +237,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -331,9 +336,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22011", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22011", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22011" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22011" } ] }, diff --git a/2022/22xxx/CVE-2022-22012.json b/2022/22xxx/CVE-2022-22012.json index b692c7b0c37..26ca7b20f93 100644 --- a/2022/22xxx/CVE-2022-22012.json +++ b/2022/22xxx/CVE-2022-22012.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -328,7 +333,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -340,7 +345,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -355,9 +360,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22012", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22012", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22012" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22012" } ] }, diff --git a/2022/22xxx/CVE-2022-22013.json b/2022/22xxx/CVE-2022-22013.json index 6cd32305232..3a92745c75b 100644 --- a/2022/22xxx/CVE-2022-22013.json +++ b/2022/22xxx/CVE-2022-22013.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -328,7 +333,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -340,7 +345,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -355,9 +360,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22013", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22013", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22013" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22013" } ] }, diff --git a/2022/22xxx/CVE-2022-22014.json b/2022/22xxx/CVE-2022-22014.json index f99d229a596..23ab5336795 100644 --- a/2022/22xxx/CVE-2022-22014.json +++ b/2022/22xxx/CVE-2022-22014.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -328,7 +333,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -340,7 +345,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -355,9 +360,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22014", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22014", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22014" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22014" } ] }, diff --git a/2022/22xxx/CVE-2022-22015.json b/2022/22xxx/CVE-2022-22015.json index e52a00b0e4b..a1115071d87 100644 --- a/2022/22xxx/CVE-2022-22015.json +++ b/2022/22xxx/CVE-2022-22015.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -112,7 +117,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -208,7 +213,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -331,9 +336,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22015", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22015", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22015" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22015" } ] }, diff --git a/2022/22xxx/CVE-2022-22016.json b/2022/22xxx/CVE-2022-22016.json index b189a264618..0b41b2fbf10 100644 --- a/2022/22xxx/CVE-2022-22016.json +++ b/2022/22xxx/CVE-2022-22016.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -211,9 +216,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22016", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22016", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22016" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22016" } ] }, diff --git a/2022/22xxx/CVE-2022-22017.json b/2022/22xxx/CVE-2022-22017.json index 5afc1a8198a..c3f13241164 100644 --- a/2022/22xxx/CVE-2022-22017.json +++ b/2022/22xxx/CVE-2022-22017.json @@ -52,7 +52,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -79,9 +79,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22017", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22017", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22017" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22017" } ] }, diff --git a/2022/22xxx/CVE-2022-22019.json b/2022/22xxx/CVE-2022-22019.json index 608d913d94b..2c969d219d0 100644 --- a/2022/22xxx/CVE-2022-22019.json +++ b/2022/22xxx/CVE-2022-22019.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -328,7 +333,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -340,7 +345,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -355,9 +360,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22019", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22019", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22019" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22019" } ] }, diff --git a/2022/22xxx/CVE-2022-22713.json b/2022/22xxx/CVE-2022-22713.json index a079da73a9c..4ec01b6f54b 100644 --- a/2022/22xxx/CVE-2022-22713.json +++ b/2022/22xxx/CVE-2022-22713.json @@ -64,7 +64,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19044.1706" } ] @@ -79,9 +79,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22713", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22713", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22713" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22713" } ] }, diff --git a/2022/23xxx/CVE-2022-23256.json b/2022/23xxx/CVE-2022-23256.json index 7f80656e45a..8dc11570697 100644 --- a/2022/23xxx/CVE-2022-23256.json +++ b/2022/23xxx/CVE-2022-23256.json @@ -54,9 +54,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23256", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23256", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23256" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23256" } ] }, diff --git a/2022/23xxx/CVE-2022-23267.json b/2022/23xxx/CVE-2022-23267.json index 929d1558e08..331693cc83a 100644 --- a/2022/23xxx/CVE-2022-23267.json +++ b/2022/23xxx/CVE-2022-23267.json @@ -175,24 +175,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/" - }, - { - "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/", - "refsource": "MISC", - "name": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267" } ] }, diff --git a/2022/23xxx/CVE-2022-23270.json b/2022/23xxx/CVE-2022-23270.json index 89d9f83ccd9..17a5369c828 100644 --- a/2022/23xxx/CVE-2022-23270.json +++ b/2022/23xxx/CVE-2022-23270.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -328,7 +333,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -340,7 +345,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -355,9 +360,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23270", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23270", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23270" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23270" } ] }, diff --git a/2022/23xxx/CVE-2022-23279.json b/2022/23xxx/CVE-2022-23279.json index 7b963ec8dc0..fc4cf4e3014 100644 --- a/2022/23xxx/CVE-2022-23279.json +++ b/2022/23xxx/CVE-2022-23279.json @@ -64,7 +64,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -112,7 +112,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -127,9 +127,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23279", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23279", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23279" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23279" } ] }, diff --git a/2022/24xxx/CVE-2022-24466.json b/2022/24xxx/CVE-2022-24466.json index 1885fc071db..d0c4abccd6b 100644 --- a/2022/24xxx/CVE-2022-24466.json +++ b/2022/24xxx/CVE-2022-24466.json @@ -40,7 +40,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -52,7 +52,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +64,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +100,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -136,7 +136,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19044.1706" } ] @@ -148,7 +148,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -160,7 +160,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -172,7 +172,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -187,9 +187,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24466", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24466", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24466" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24466" } ] }, diff --git a/2022/24xxx/CVE-2022-24487.json b/2022/24xxx/CVE-2022-24487.json index 3e4dece2201..6a7937c1e9a 100644 --- a/2022/24xxx/CVE-2022-24487.json +++ b/2022/24xxx/CVE-2022-24487.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Windows Local Security Authority (LSA) Remote Code Execution Vulnerability" + "value": "Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability" } ] }, @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2803" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2803" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2803" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.643" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19044.1645" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5066" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5066" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5066" } ] diff --git a/2022/24xxx/CVE-2022-24495.json b/2022/24xxx/CVE-2022-24495.json index 288f274e136..6b6bddbd685 100644 --- a/2022/24xxx/CVE-2022-24495.json +++ b/2022/24xxx/CVE-2022-24495.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Windows Direct Show - Remote Code Execution Vulnerability" + "value": "Windows Direct Show Remote Code Execution Vulnerability" } ] }, @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2803" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2803" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2803" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.643" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19044.1645" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5066" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5066" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5066" } ] diff --git a/2022/24xxx/CVE-2022-24527.json b/2022/24xxx/CVE-2022-24527.json index 9b538c8f5fc..55d90c0a26b 100644 --- a/2022/24xxx/CVE-2022-24527.json +++ b/2022/24xxx/CVE-2022-24527.json @@ -55,9 +55,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24527", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24527", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24527" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24527" } ] }, diff --git a/2022/26xxx/CVE-2022-26832.json b/2022/26xxx/CVE-2022-26832.json index 55f7da5f29d..6bb24f7e622 100644 --- a/2022/26xxx/CVE-2022-26832.json +++ b/2022/26xxx/CVE-2022-26832.json @@ -175,9 +175,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26832", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26832", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26832" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26832" } ] }, diff --git a/2022/26xxx/CVE-2022-26905.json b/2022/26xxx/CVE-2022-26905.json index d5978358471..6cc9f9a9858 100644 --- a/2022/26xxx/CVE-2022-26905.json +++ b/2022/26xxx/CVE-2022-26905.json @@ -55,14 +55,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26905", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26905", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26905" - }, - { - "url": "https://security.gentoo.org/glsa/202208-25", - "refsource": "MISC", - "name": "https://security.gentoo.org/glsa/202208-25" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26905" } ] }, diff --git a/2022/26xxx/CVE-2022-26913.json b/2022/26xxx/CVE-2022-26913.json index e626e641337..6ff4c628ca8 100644 --- a/2022/26xxx/CVE-2022-26913.json +++ b/2022/26xxx/CVE-2022-26913.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -163,9 +168,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26913", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26913", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26913" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26913" } ] }, diff --git a/2022/26xxx/CVE-2022-26923.json b/2022/26xxx/CVE-2022-26923.json index 5e0fed1463f..173ec3854f6 100644 --- a/2022/26xxx/CVE-2022-26923.json +++ b/2022/26xxx/CVE-2022-26923.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.4252" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.4252" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.4252" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.1668" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5850" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5850" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5850" } ] @@ -220,7 +225,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20919" } ] @@ -232,7 +237,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20919" } ] @@ -247,9 +252,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26923", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26923" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26923" } ] }, diff --git a/2022/26xxx/CVE-2022-26925.json b/2022/26xxx/CVE-2022-26925.json index b809653f3d5..ab1be1da991 100644 --- a/2022/26xxx/CVE-2022-26925.json +++ b/2022/26xxx/CVE-2022-26925.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -328,7 +333,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -340,7 +345,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -355,9 +360,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26925", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26925", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26925" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26925" } ] }, diff --git a/2022/26xxx/CVE-2022-26926.json b/2022/26xxx/CVE-2022-26926.json index 6f048f68ff7..e72d627c24a 100644 --- a/2022/26xxx/CVE-2022-26926.json +++ b/2022/26xxx/CVE-2022-26926.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -268,7 +273,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.0.6003.0", "version_value": "6.0.6003.21481" } ] @@ -280,7 +285,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.1.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -292,7 +297,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.0.0", + "version_name": "6.1.7601.0", "version_value": "6.1.7601.25954" } ] @@ -304,7 +309,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -316,7 +321,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -328,7 +333,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -340,7 +345,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -355,9 +360,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26926", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26926", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26926" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26926" } ] }, diff --git a/2022/26xxx/CVE-2022-26927.json b/2022/26xxx/CVE-2022-26927.json index e1098b02a30..678023a2686 100644 --- a/2022/26xxx/CVE-2022-26927.json +++ b/2022/26xxx/CVE-2022-26927.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -163,9 +168,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26927", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26927", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26927" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26927" } ] }, diff --git a/2022/26xxx/CVE-2022-26930.json b/2022/26xxx/CVE-2022-26930.json index a1d8cde7cf7..d0e84cc2973 100644 --- a/2022/26xxx/CVE-2022-26930.json +++ b/2022/26xxx/CVE-2022-26930.json @@ -38,6 +38,11 @@ "product_name": "Windows 10 Version 1809", "version": { "version_data": [ + { + "version_affected": "<", + "version_name": "10.0.17763.0", + "version_value": "10.0.17763.2928" + }, { "version_affected": "<", "version_name": "10.0.0", @@ -52,7 +57,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -64,7 +69,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.17763.0", "version_value": "10.0.17763.2928" } ] @@ -100,7 +105,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.20348.0", "version_value": "10.0.20348.707" } ] @@ -148,7 +153,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.19043.0", "version_value": "10.0.19043.1706" } ] @@ -160,7 +165,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.10240.0", "version_value": "10.0.10240.19297" } ] @@ -172,7 +177,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -184,7 +189,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -196,7 +201,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "10.0.0", + "version_name": "10.0.14393.0", "version_value": "10.0.14393.5125" } ] @@ -220,7 +225,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -232,7 +237,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.2.0", + "version_name": "6.2.9200.0", "version_value": "6.2.9200.23714" } ] @@ -244,7 +249,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -256,7 +261,7 @@ "version_data": [ { "version_affected": "<", - "version_name": "6.3.0", + "version_name": "6.3.9600.0", "version_value": "6.3.9600.20371" } ] @@ -271,9 +276,9 @@ "references": { "reference_data": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26930", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26930", "refsource": "MISC", - "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26930" + "name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26930" } ] }, diff --git a/2024/13xxx/CVE-2024-13124.json b/2024/13xxx/CVE-2024-13124.json new file mode 100644 index 00000000000..c90e918b0e6 --- /dev/null +++ b/2024/13xxx/CVE-2024-13124.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13124", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/13xxx/CVE-2024-13125.json b/2024/13xxx/CVE-2024-13125.json new file mode 100644 index 00000000000..5faa4019870 --- /dev/null +++ b/2024/13xxx/CVE-2024-13125.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-13125", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/48xxx/CVE-2024-48197.json b/2024/48xxx/CVE-2024-48197.json index d3e5ed25334..c2535e113b3 100644 --- a/2024/48xxx/CVE-2024-48197.json +++ b/2024/48xxx/CVE-2024-48197.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2024-48197", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2024-48197", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Cross Site Scripting vulnerability in Audiocodes MP-202b v.4.4.3 allows a remote attacker to escalate privileges via the login page of the web interface." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://audiocodes.com", + "refsource": "MISC", + "name": "http://audiocodes.com" + }, + { + "url": "http://mp-202b.com", + "refsource": "MISC", + "name": "http://mp-202b.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/GCatt-AS/CVE-2024-48197", + "url": "https://github.com/GCatt-AS/CVE-2024-48197" } ] } diff --git a/2024/56xxx/CVE-2024-56831.json b/2024/56xxx/CVE-2024-56831.json new file mode 100644 index 00000000000..18faf44875a --- /dev/null +++ b/2024/56xxx/CVE-2024-56831.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56831", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56832.json b/2024/56xxx/CVE-2024-56832.json new file mode 100644 index 00000000000..c696f34011c --- /dev/null +++ b/2024/56xxx/CVE-2024-56832.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56832", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56833.json b/2024/56xxx/CVE-2024-56833.json new file mode 100644 index 00000000000..e0cbd456c6d --- /dev/null +++ b/2024/56xxx/CVE-2024-56833.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56833", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2024/56xxx/CVE-2024-56834.json b/2024/56xxx/CVE-2024-56834.json new file mode 100644 index 00000000000..510c6e95850 --- /dev/null +++ b/2024/56xxx/CVE-2024-56834.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2024-56834", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0174.json b/2025/0xxx/CVE-2025-0174.json new file mode 100644 index 00000000000..bc73458c975 --- /dev/null +++ b/2025/0xxx/CVE-2025-0174.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0174", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0175.json b/2025/0xxx/CVE-2025-0175.json new file mode 100644 index 00000000000..9a263573c21 --- /dev/null +++ b/2025/0xxx/CVE-2025-0175.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0175", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0176.json b/2025/0xxx/CVE-2025-0176.json new file mode 100644 index 00000000000..176592c298b --- /dev/null +++ b/2025/0xxx/CVE-2025-0176.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0176", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2025/0xxx/CVE-2025-0177.json b/2025/0xxx/CVE-2025-0177.json new file mode 100644 index 00000000000..c9c9dd18d75 --- /dev/null +++ b/2025/0xxx/CVE-2025-0177.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2025-0177", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file