diff --git a/2023/35xxx/CVE-2023-35299.json b/2023/35xxx/CVE-2023-35299.json index 2390888de75..f91b57518b1 100644 --- a/2023/35xxx/CVE-2023-35299.json +++ b/2023/35xxx/CVE-2023-35299.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-125: Out-of-bounds Read", + "cweId": "CWE-125" } ] } @@ -226,6 +227,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26623" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/35xxx/CVE-2023-35300.json b/2023/35xxx/CVE-2023-35300.json index 9e1e1c23b92..db1c1e250d6 100644 --- a/2023/35xxx/CVE-2023-35300.json +++ b/2023/35xxx/CVE-2023-35300.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-416: Use After Free", + "cweId": "CWE-416" } ] } @@ -226,6 +227,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26623" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/35xxx/CVE-2023-35302.json b/2023/35xxx/CVE-2023-35302.json index 3e8c3f86c57..09901474bf0 100644 --- a/2023/35xxx/CVE-2023-35302.json +++ b/2023/35xxx/CVE-2023-35302.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/35xxx/CVE-2023-35303.json b/2023/35xxx/CVE-2023-35303.json index e60ddaceae8..3b15b016220 100644 --- a/2023/35xxx/CVE-2023-35303.json +++ b/2023/35xxx/CVE-2023-35303.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } @@ -226,6 +227,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26623" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/35xxx/CVE-2023-35304.json b/2023/35xxx/CVE-2023-35304.json index 8d6203e5887..bff6d43bba8 100644 --- a/2023/35xxx/CVE-2023-35304.json +++ b/2023/35xxx/CVE-2023-35304.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/35xxx/CVE-2023-35305.json b/2023/35xxx/CVE-2023-35305.json index f8934db7c9e..e022cf84a13 100644 --- a/2023/35xxx/CVE-2023-35305.json +++ b/2023/35xxx/CVE-2023-35305.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-122: Heap-based Buffer Overflow", + "cweId": "CWE-122" } ] } diff --git a/2023/35xxx/CVE-2023-35306.json b/2023/35xxx/CVE-2023-35306.json index 3ba2792314b..1dd3629731c 100644 --- a/2023/35xxx/CVE-2023-35306.json +++ b/2023/35xxx/CVE-2023-35306.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Information Disclosure" + "value": "CWE-20: Improper Input Validation", + "cweId": "CWE-20" } ] } diff --git a/2023/35xxx/CVE-2023-35308.json b/2023/35xxx/CVE-2023-35308.json index cb5b5c14bee..5acbd63fa1b 100644 --- a/2023/35xxx/CVE-2023-35308.json +++ b/2023/35xxx/CVE-2023-35308.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Security Feature Bypass" + "value": "CWE-73: External Control of File Name or Path", + "cweId": "CWE-73" } ] } diff --git a/2023/35xxx/CVE-2023-35309.json b/2023/35xxx/CVE-2023-35309.json index b56cd2f3d12..6c6d43dc56b 100644 --- a/2023/35xxx/CVE-2023-35309.json +++ b/2023/35xxx/CVE-2023-35309.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "Microsoft Message Queuing Remote Code Execution Vulnerability" + "value": "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability" } ] }, @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory", + "cweId": "CWE-591" } ] } @@ -226,6 +227,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26623" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/35xxx/CVE-2023-35310.json b/2023/35xxx/CVE-2023-35310.json index 41eac2864c4..69840104926 100644 --- a/2023/35xxx/CVE-2023-35310.json +++ b/2023/35xxx/CVE-2023-35310.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Remote Code Execution" + "value": "CWE-591: Sensitive Data Storage in Improperly Locked Memory", + "cweId": "CWE-591" } ] } @@ -142,6 +143,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26623" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": { diff --git a/2023/35xxx/CVE-2023-35311.json b/2023/35xxx/CVE-2023-35311.json index 42945b92653..7c7675bfc00 100644 --- a/2023/35xxx/CVE-2023-35311.json +++ b/2023/35xxx/CVE-2023-35311.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Security Feature Bypass" + "value": "CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition", + "cweId": "CWE-367" } ] } diff --git a/2023/35xxx/CVE-2023-35312.json b/2023/35xxx/CVE-2023-35312.json index e41bf38005c..43026cc346e 100644 --- a/2023/35xxx/CVE-2023-35312.json +++ b/2023/35xxx/CVE-2023-35312.json @@ -21,7 +21,8 @@ "description": [ { "lang": "eng", - "value": "Elevation of Privilege" + "value": "CWE-190: Integer Overflow or Wraparound", + "cweId": "CWE-190" } ] } @@ -190,6 +191,18 @@ ] } }, + { + "product_name": "Windows Server 2008 R2 Service Pack 1 (Server Core installation)", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "6.0.0", + "version_value": "6.1.7601.26623" + } + ] + } + }, { "product_name": "Windows Server 2012", "version": {