"-Synchronized-Data."

This commit is contained in:
CVE Team 2023-04-11 20:01:00 +00:00
parent 5e16d0c351
commit 9d05477a80
No known key found for this signature in database
GPG Key ID: E3252B3D49582C98
67 changed files with 1802 additions and 474 deletions

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Security Feature Bypass Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Security Feature Bypass Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Xbox Live Save Service Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Xbox Live Save Service Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Word Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Word Information Disclosure Vulnerability"

View File

@ -1,105 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2022-41104",
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft Office",
"version": {
"version_data": [
{
"version_value": "2019 for 32-bit editions"
},
{
"version_value": "2019 for 64-bit editions"
}
]
}
},
{
"product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft Office LTSC 2021 for 64-bit editions",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft Office LTSC 2021 for 32-bit editions",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft Excel",
"version": {
"version_data": [
{
"version_value": "2016 (32-bit edition)"
},
{
"version_value": "2016 (64-bit edition)"
},
{
"version_value": "2013 RT Service Pack 1"
},
{
"version_value": "2013 Service Pack 1 (32-bit editions)"
},
{
"version_value": "2013 Service Pack 1 (64-bit editions)"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Excel Security Feature Bypass Vulnerability."
"value": "Microsoft Excel Security Feature Bypass Vulnerability"
}
]
},
@ -115,21 +27,77 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Microsoft Office",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.0.1",
"version_value": "https://aka.ms/OfficeSecurityReleases"
}
]
}
},
{
"product_name": "Microsoft 365 Apps for Enterprise",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.0.1",
"version_value": "https://aka.ms/OfficeSecurityReleases"
}
]
}
},
{
"product_name": "Microsoft Excel",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.0.0.0",
"version_value": "16.0.5369.1000"
},
{
"version_affected": "<",
"version_name": "15.0.0.0",
"version_value": "15.0.5501.1000"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41104",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41104",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41104"
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41104"
}
]
},
"impact": {
"cvss": {
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C",
"baseScore": "5.5",
"temporalScore": "4.8",
"version": "3.1"
}
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 5.5,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C"
}
]
}
}

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Excel Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Excel Information Disclosure Vulnerability"

View File

@ -1,125 +1,17 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ASSIGNER": "secure@microsoft.com",
"ID": "CVE-2022-41106",
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Microsoft Office",
"version": {
"version_data": [
{
"version_value": "2019 for 32-bit editions"
},
{
"version_value": "2019 for 64-bit editions"
}
]
}
},
{
"product_name": "Microsoft Office Online Server",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft 365 Apps for Enterprise for 32-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft 365 Apps for Enterprise for 64-bit Systems",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft Office LTSC 2021 for 64-bit editions",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft Office LTSC 2021 for 32-bit editions",
"version": {
"version_data": [
{
"version_value": ""
}
]
}
},
{
"product_name": "Microsoft Excel",
"version": {
"version_data": [
{
"version_value": "2016 (32-bit edition)"
},
{
"version_value": "2016 (64-bit edition)"
},
{
"version_value": "2013 RT Service Pack 1"
},
{
"version_value": "2013 Service Pack 1 (32-bit editions)"
},
{
"version_value": "2013 Service Pack 1 (64-bit editions)"
}
]
}
},
{
"product_name": "Microsoft Office Web Apps",
"version": {
"version_data": [
{
"version_value": "Server 2013 Service Pack 1"
}
]
}
}
]
},
"vendor_name": "Microsoft"
}
]
}
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Excel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41063."
"value": "Microsoft Excel Remote Code Execution Vulnerability"
}
]
},
@ -135,26 +27,101 @@
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Microsoft Office",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.0.1",
"version_value": "https://aka.ms/OfficeSecurityReleases"
}
]
}
},
{
"product_name": "Microsoft Office Online Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.0.1",
"version_value": "16.0.10392.20000"
}
]
}
},
{
"product_name": "Microsoft 365 Apps for Enterprise",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.0.1",
"version_value": "https://aka.ms/OfficeSecurityReleases"
}
]
}
},
{
"product_name": "Microsoft Excel",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.0.0.0",
"version_value": "16.0.5369.1000"
},
{
"version_affected": "<",
"version_name": "15.0.0.0",
"version_value": "15.0.5501.1000"
}
]
}
},
{
"product_name": "Microsoft Office Web Apps Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "15.0.1",
"version_value": "15.0.5501.1000"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41106",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41106",
"refsource": "MISC",
"name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41106"
},
{
"refsource": "MISC",
"name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1591",
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1591"
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-41106"
}
]
},
"impact": {
"cvss": {
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C",
"baseScore": "7.8",
"temporalScore": "6.8",
"version": "3.1"
}
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 8.8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
}
]
}
}

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Win32k Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Win32k Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Bind Filter Driver Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Bind Filter Driver Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Scripting Languages Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Scripting Languages Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SharePoint Server Spoofing Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft SharePoint Server Spoofing Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows CNG Key Isolation Service Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows CNG Key Isolation Service Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Contacts Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Contacts Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Media Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Media Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Media Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Media Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Error Reporting Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Error Reporting Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Client Server Run-Time Subsystem (CSRSS) Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Client Server Run-Time Subsystem (CSRSS) Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Bluetooth Driver Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Windows Bluetooth Driver Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Bluetooth Driver Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Bluetooth Driver Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Projected File System Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Projected File System Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Graphics Component Information Disclosure Vulnerability"
},
{
"lang": "eng",
"value": "Windows Graphics Component Information Disclosure Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Hyper-V Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Windows Hyper-V Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Kernel Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office OneNote Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office OneNote Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows SmartScreen Security Feature Bypass Vulnerability"
},
{
"lang": "eng",
"value": "Windows SmartScreen Security Feature Bypass Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Kernel Denial of Service Vulnerability"
},
{
"lang": "eng",
"value": "Windows Kernel Denial of Service Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "DirectX Graphics Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "DirectX Graphics Kernel Elevation of Privilege Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Outlook for Mac Spoofing Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Outlook for Mac Spoofing Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Azure DevOps Server Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Azure DevOps Server Remote Code Execution Vulnerability"

View File

@ -1,17 +1,246 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-21554",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Microsoft Message Queuing Remote Code Execution Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 1809",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2022",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.20348.1668"
}
]
}
},
{
"product_name": "Windows 10 Version 20H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19042.2846"
}
]
}
},
{
"product_name": "Windows 11 version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22000.1817"
}
]
}
},
{
"product_name": "Windows 10 Version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19044.2846"
}
]
}
},
{
"product_name": "Windows 11 version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.1555"
}
]
}
},
{
"product_name": "Windows 10 Version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19045.2846"
}
]
}
},
{
"product_name": "Windows 10 Version 1507",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.10240.19869"
}
]
}
},
{
"product_name": "Windows 10 Version 1607",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2016",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2008",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.0.6003.22015"
}
]
}
},
{
"product_name": "Windows Server 2008 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.1.0",
"version_value": "6.1.7601.26466"
},
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.1.7601.26466"
}
]
}
},
{
"product_name": "Windows Server 2012",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.2.0",
"version_value": "6.2.9200.24216"
}
]
}
},
{
"product_name": "Windows Server 2012 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.3.0",
"version_value": "6.3.9600.20919"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21554"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "CRITICAL",
"baseScore": 9.8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
}
]
}

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Azure DevOps Server Cross-Site Scripting Vulnerability"
},
{
"lang": "eng",
"value": "Azure DevOps Server Cross-Site Scripting Vulnerability"

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
},
{
"lang": "eng",
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"

View File

@ -1,17 +1,246 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-21727",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 1809",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2022",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.20348.1668"
}
]
}
},
{
"product_name": "Windows 10 Version 20H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19042.2846"
}
]
}
},
{
"product_name": "Windows 11 version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22000.1817"
}
]
}
},
{
"product_name": "Windows 10 Version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19044.2846"
}
]
}
},
{
"product_name": "Windows 11 version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.1555"
}
]
}
},
{
"product_name": "Windows 10 Version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19045.2846"
}
]
}
},
{
"product_name": "Windows 10 Version 1507",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.10240.19869"
}
]
}
},
{
"product_name": "Windows 10 Version 1607",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2016",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2008",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.0.6003.22015"
}
]
}
},
{
"product_name": "Windows Server 2008 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.1.0",
"version_value": "6.1.7601.26466"
},
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.1.7601.26466"
}
]
}
},
{
"product_name": "Windows Server 2012",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.2.0",
"version_value": "6.2.9200.24216"
}
]
}
},
{
"product_name": "Windows Server 2012 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.3.0",
"version_value": "6.3.9600.20919"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21727",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21727"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 8.8,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C"
}
]
}

View File

@ -1,17 +1,246 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-21729",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Remote Procedure Call Runtime Information Disclosure Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 1809",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2022",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.20348.1668"
}
]
}
},
{
"product_name": "Windows 10 Version 20H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19042.2846"
}
]
}
},
{
"product_name": "Windows 11 version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22000.1817"
}
]
}
},
{
"product_name": "Windows 10 Version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19044.2846"
}
]
}
},
{
"product_name": "Windows 11 version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.1555"
}
]
}
},
{
"product_name": "Windows 10 Version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19045.2846"
}
]
}
},
{
"product_name": "Windows 10 Version 1507",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.10240.19869"
}
]
}
},
{
"product_name": "Windows 10 Version 1607",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2016",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2008",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.0.6003.22015"
}
]
}
},
{
"product_name": "Windows Server 2008 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.1.0",
"version_value": "6.1.7601.26466"
},
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.1.7601.26466"
}
]
}
},
{
"product_name": "Windows Server 2012",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.2.0",
"version_value": "6.2.9200.24216"
}
]
}
},
{
"product_name": "Windows Server 2012 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.3.0",
"version_value": "6.3.9600.20919"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21729",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21729"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 4.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C"
}
]
}

View File

@ -1,17 +1,246 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-21769",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Microsoft Message Queuing Denial of Service Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 1809",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2022",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.20348.1668"
}
]
}
},
{
"product_name": "Windows 10 Version 20H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19042.2846"
}
]
}
},
{
"product_name": "Windows 11 version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22000.1817"
}
]
}
},
{
"product_name": "Windows 10 Version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19044.2846"
}
]
}
},
{
"product_name": "Windows 11 version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.1555"
}
]
}
},
{
"product_name": "Windows 10 Version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19045.2846"
}
]
}
},
{
"product_name": "Windows 10 Version 1507",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.10240.19869"
}
]
}
},
{
"product_name": "Windows 10 Version 1607",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2016",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2008",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.0.6003.22015"
}
]
}
},
{
"product_name": "Windows Server 2008 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.1.0",
"version_value": "6.1.7601.26466"
},
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.1.7601.26466"
}
]
}
},
{
"product_name": "Windows Server 2012",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.2.0",
"version_value": "6.2.9200.24216"
}
]
}
},
{
"product_name": "Windows Server 2012 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.3.0",
"version_value": "6.3.9600.20919"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21769",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-21769"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C"
}
]
}

View File

@ -1,17 +1,109 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-23375",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Microsoft ODBC and OLE DB Remote Code Execution Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Microsoft OLE DB Driver 18 for SQL Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "18.0.0",
"version_value": "18.6.5"
}
]
}
},
{
"product_name": "Microsoft OLE DB Driver 19 for SQL Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "19.0.0",
"version_value": "19.3.0"
}
]
}
},
{
"product_name": "Microsoft ODBC Driver 17 for SQL Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "17.0.0.0",
"version_value": "17.10.3.1"
}
]
}
},
{
"product_name": "Microsoft ODBC Driver 18 for SQL Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "18.0.0.0",
"version_value": "18.2.1.1"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23375",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23375"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 7.8,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C"
}
]
}

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Service Fabric Explorer Spoofing Vulnerability"
},
{
"lang": "eng",
"value": "Service Fabric Explorer Spoofing Vulnerability"

View File

@ -1,17 +1,127 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-23384",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Microsoft SQL Server Remote Code Execution Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Microsoft SQL Server",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.6814.4"
},
{
"version_affected": "<",
"version_name": "11.0.0",
"version_value": "11.0.7512.11"
},
{
"version_affected": "<",
"version_name": "14.0.0",
"version_value": "14.0.2047.8"
},
{
"version_affected": "<",
"version_name": "12.0.0",
"version_value": "12.0.6444.4"
},
{
"version_affected": "<",
"version_name": "15.0.0",
"version_value": "15.0.2101.7"
},
{
"version_affected": "<",
"version_name": "13.0.0",
"version_value": "13.0.6430.49"
},
{
"version_affected": "<",
"version_name": "16.0.0",
"version_value": "16.0.1050.5"
}
]
}
},
{
"product_name": "Microsoft SQL Server 2017",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "14.0.0",
"version_value": "14.0.3460.9"
}
]
}
},
{
"product_name": "Microsoft SQL Server 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "15.0.0",
"version_value": "15.0.4280.7"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23384",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23384"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 7.3,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C"
}
]
}

View File

@ -9,10 +9,6 @@
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Elevation of Privilege Vulnerability"
},
{
"lang": "eng",
"value": "Windows Point-to-Point Protocol over Ethernet (PPPoE) Elevation of Privilege Vulnerability"

View File

@ -1,17 +1,105 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28260",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": ".NET DLL Hijacking Remote Code Execution Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote Code Execution"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": ".NET",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.0.16"
},
{
"version_affected": "<",
"version_name": "7.0.0",
"version_value": "7.0.5"
}
]
}
},
{
"product_name": "Microsoft Visual Studio",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "17.5.0",
"version_value": "17.5.4"
},
{
"version_affected": "<",
"version_name": "17.4.0",
"version_value": "17.4.7"
},
{
"version_affected": "<",
"version_name": "17.2.0",
"version_value": "17.2.15"
},
{
"version_affected": "<",
"version_name": "17.0.0",
"version_value": "17.0.21"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28260"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 7.8,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C"
}
]
}

View File

@ -1,17 +1,100 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28262",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Visual Studio Elevation of Privilege Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Elevation of Privilege"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Microsoft Visual Studio",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "17.2.0",
"version_value": "17.2.15"
},
{
"version_affected": "<",
"version_name": "17.0.0",
"version_value": "17.0.21"
},
{
"version_affected": "<",
"version_name": "17.4.0",
"version_value": "17.4.7"
},
{
"version_affected": "<",
"version_name": "17.5.0",
"version_value": "17.5.4"
}
]
}
},
{
"product_name": "Microsoft Visual Studio 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.11.0",
"version_value": "16.11.26"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28262",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28262"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 7.8,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C"
}
]
}

View File

@ -1,17 +1,100 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28263",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Visual Studio Information Disclosure Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Microsoft Visual Studio",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "17.2.0",
"version_value": "17.2.15"
},
{
"version_affected": "<",
"version_name": "17.0.0",
"version_value": "17.0.21"
},
{
"version_affected": "<",
"version_name": "17.4.0",
"version_value": "17.4.7"
},
{
"version_affected": "<",
"version_name": "17.5.0",
"version_value": "17.5.4"
}
]
}
},
{
"product_name": "Microsoft Visual Studio 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "16.11.0",
"version_value": "16.11.26"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28263"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 5.5,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C"
}
]
}

View File

@ -1,17 +1,246 @@
{
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2023-28266",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ASSIGNER": "secure@microsoft.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value": "Windows Common Log File System Driver Information Disclosure Vulnerability"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information Disclosure"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Microsoft",
"product": {
"product_data": [
{
"product_name": "Windows 10 Version 1809",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2019",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.17763.4252"
}
]
}
},
{
"product_name": "Windows Server 2022",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.20348.1668"
}
]
}
},
{
"product_name": "Windows 10 Version 20H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19042.2846"
}
]
}
},
{
"product_name": "Windows 11 version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22000.1817"
}
]
}
},
{
"product_name": "Windows 10 Version 21H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19044.2846"
}
]
}
},
{
"product_name": "Windows 11 version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.22621.1555"
}
]
}
},
{
"product_name": "Windows 10 Version 22H2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.19045.2846"
}
]
}
},
{
"product_name": "Windows 10 Version 1507",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.10240.19869"
}
]
}
},
{
"product_name": "Windows 10 Version 1607",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2016",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "10.0.0",
"version_value": "10.0.14393.5850"
}
]
}
},
{
"product_name": "Windows Server 2008",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.0.6003.22015"
}
]
}
},
{
"product_name": "Windows Server 2008 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.1.0",
"version_value": "6.1.7601.26466"
},
{
"version_affected": "<",
"version_name": "6.0.0",
"version_value": "6.1.7601.26466"
}
]
}
},
{
"product_name": "Windows Server 2012",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.2.0",
"version_value": "6.2.9200.24216"
}
]
}
},
{
"product_name": "Windows Server 2012 R2",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "6.3.0",
"version_value": "6.3.9600.20919"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28266",
"refsource": "MISC",
"name": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28266"
}
]
},
"impact": {
"cvss": [
{
"version": "3.1",
"baseSeverity": "HIGH",
"baseScore": 5.5,
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C"
}
]
}

View File

@ -11,7 +11,7 @@
"description_data": [
{
"lang": "eng",
"value": "Microsoft Office Remote Code Execution Vulnerability"
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"
}
]
},

View File

@ -53,7 +53,7 @@
{
"version_affected": "<",
"version_name": "9.1.0",
"version_value": "9.1.17.29"
"version_value": "9.1.XX.XX"
}
]
}

View File

@ -53,7 +53,7 @@
{
"version_affected": "<",
"version_name": "9.1.0",
"version_value": "9.1.17.29"
"version_value": "9.1.XX.XX"
}
]
}