mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-06-29T04:00:26.718571+00:00
This commit is contained in:
parent
9e2a90e4c3
commit
949298f841
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-21967",
|
"id": "CVE-2022-21967",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:09.917",
|
"published": "2022-03-09T17:15:09.917",
|
||||||
"lastModified": "2022-03-14T13:49:46.740",
|
"lastModified": "2023-06-29T02:15:09.427",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability."
|
"value": "Xbox Live Auth Manager for Windows Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -154,12 +154,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21967",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21967",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-21973",
|
"id": "CVE-2022-21973",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:10.020",
|
"published": "2022-03-09T17:15:10.020",
|
||||||
"lastModified": "2022-03-14T13:52:02.110",
|
"lastModified": "2023-06-29T02:15:09.550",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Media Center Update Denial of Service Vulnerability."
|
"value": "Windows Media Center Update Denial of Service Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -134,12 +134,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21973",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21973",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-21975",
|
"id": "CVE-2022-21975",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:10.113",
|
"published": "2022-03-09T17:15:10.113",
|
||||||
"lastModified": "2022-05-23T17:29:19.050",
|
"lastModified": "2023-06-29T02:15:09.633",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Hyper-V Denial of Service Vulnerability."
|
"value": "Windows Hyper-V Denial of Service Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -174,12 +174,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21975",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21975",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-21977",
|
"id": "CVE-2022-21977",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:10.207",
|
"published": "2022-03-09T17:15:10.207",
|
||||||
"lastModified": "2022-05-23T17:29:19.063",
|
"lastModified": "2023-06-29T02:15:09.723",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Media Foundation Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-22010."
|
"value": "Media Foundation Information Disclosure Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -189,12 +189,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21977",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21977",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-21990",
|
"id": "CVE-2022-21990",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:10.300",
|
"published": "2022-03-09T17:15:10.300",
|
||||||
"lastModified": "2022-05-23T17:29:19.077",
|
"lastModified": "2023-06-29T02:15:09.813",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-23285."
|
"value": "Remote Desktop Client Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -209,12 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21990",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21990",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-22006",
|
"id": "CVE-2022-22006",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:10.390",
|
"published": "2022-03-09T17:15:10.390",
|
||||||
"lastModified": "2022-03-14T15:54:55.790",
|
"lastModified": "2023-06-29T02:15:09.897",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22007, CVE-2022-23301, CVE-2022-24452, CVE-2022-24453, CVE-2022-24456."
|
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -115,19 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0012/MNDT-2022-0012.md",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22006",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22006",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-22007",
|
"id": "CVE-2022-22007",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:10.477",
|
"published": "2022-03-09T17:15:10.477",
|
||||||
"lastModified": "2022-03-14T16:03:32.487",
|
"lastModified": "2023-06-29T02:15:09.983",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22006, CVE-2022-23301, CVE-2022-24452, CVE-2022-24453, CVE-2022-24456."
|
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -115,19 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0013/MNDT-2022-0013.md",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22007",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22007",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-22010",
|
"id": "CVE-2022-22010",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:10.667",
|
"published": "2022-03-09T17:15:10.667",
|
||||||
"lastModified": "2022-05-23T17:29:19.093",
|
"lastModified": "2023-06-29T02:15:10.067",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Media Foundation Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21977."
|
"value": "Media Foundation Information Disclosure Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 5.5,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.8,
|
|
||||||
"impactScore": 3.6
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 2.5
|
"impactScore": 2.5
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -194,12 +194,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-22010",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-22010",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23253",
|
"id": "CVE-2022-23253",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:10.837",
|
"published": "2022-03-09T17:15:10.837",
|
||||||
"lastModified": "2022-05-23T17:29:19.110",
|
"lastModified": "2023-06-29T02:15:10.163",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Point-to-Point Tunneling Protocol Denial of Service Vulnerability."
|
"value": "Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -204,12 +204,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23253",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23253",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23265",
|
"id": "CVE-2022-23265",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:10.933",
|
"published": "2022-03-09T17:15:10.933",
|
||||||
"lastModified": "2022-03-14T16:12:57.360",
|
"lastModified": "2023-06-29T02:15:10.243",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability."
|
"value": "Microsoft Defender for IoT Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"availabilityImpact": "HIGH",
|
|
||||||
"baseScore": 8.8,
|
|
||||||
"baseSeverity": "HIGH"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 2.8,
|
|
||||||
"impactScore": 5.9
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23265",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23265",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23266",
|
"id": "CVE-2022-23266",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.030",
|
"published": "2022-03-09T17:15:11.030",
|
||||||
"lastModified": "2022-03-14T16:16:26.387",
|
"lastModified": "2023-06-29T02:15:10.320",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability."
|
"value": "Microsoft Defender for IoT Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23266",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23266",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23277",
|
"id": "CVE-2022-23277",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.113",
|
"published": "2022-03-09T17:15:11.113",
|
||||||
"lastModified": "2022-08-26T19:15:13.573",
|
"lastModified": "2023-06-29T02:15:10.393",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability."
|
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -134,21 +134,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23277",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Exploit",
|
|
||||||
"Third Party Advisory",
|
|
||||||
"VDB Entry"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23277",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23278",
|
"id": "CVE-2022-23278",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.210",
|
"published": "2022-03-09T17:15:11.210",
|
||||||
"lastModified": "2022-05-23T17:29:19.123",
|
"lastModified": "2023-06-29T02:15:10.480",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Defender for Endpoint Spoofing Vulnerability."
|
"value": "Microsoft Defender for Endpoint Spoofing Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -241,12 +241,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23278",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23278",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23281",
|
"id": "CVE-2022-23281",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.323",
|
"published": "2022-03-09T17:15:11.323",
|
||||||
"lastModified": "2022-05-23T17:29:19.137",
|
"lastModified": "2023-06-29T02:15:10.590",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Common Log File System Driver Information Disclosure Vulnerability."
|
"value": "Windows Common Log File System Driver Information Disclosure Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -209,12 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23281",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23281",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23282",
|
"id": "CVE-2022-23282",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.427",
|
"published": "2022-03-09T17:15:11.427",
|
||||||
"lastModified": "2022-03-14T16:44:59.667",
|
"lastModified": "2023-06-29T02:15:10.667",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Paint 3D Remote Code Execution Vulnerability."
|
"value": "Paint 3D Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -114,12 +114,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23282",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23282",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23283",
|
"id": "CVE-2022-23283",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.530",
|
"published": "2022-03-09T17:15:11.530",
|
||||||
"lastModified": "2022-05-23T17:29:19.160",
|
"lastModified": "2023-06-29T02:15:10.747",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows ALPC Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23287, CVE-2022-24505."
|
"value": "Windows ALPC Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -209,12 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23283",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23283",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23284",
|
"id": "CVE-2022-23284",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.667",
|
"published": "2022-03-09T17:15:11.667",
|
||||||
"lastModified": "2022-05-23T17:29:19.180",
|
"lastModified": "2023-06-29T02:15:10.827",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Print Spooler Elevation of Privilege Vulnerability."
|
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -194,12 +194,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23284",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23284",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23285",
|
"id": "CVE-2022-23285",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.770",
|
"published": "2022-03-09T17:15:11.770",
|
||||||
"lastModified": "2022-03-14T16:55:44.697",
|
"lastModified": "2023-06-29T02:15:10.917",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21990."
|
"value": "Remote Desktop Client Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -189,12 +189,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23285",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23285",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23286",
|
"id": "CVE-2022-23286",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.893",
|
"published": "2022-03-09T17:15:11.893",
|
||||||
"lastModified": "2022-05-23T17:29:19.197",
|
"lastModified": "2023-06-29T02:15:11.000",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability."
|
"value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -159,12 +159,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23286",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23286",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23287",
|
"id": "CVE-2022-23287",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:11.993",
|
"published": "2022-03-09T17:15:11.993",
|
||||||
"lastModified": "2022-05-23T17:29:19.210",
|
"lastModified": "2023-06-29T02:15:11.087",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows ALPC Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23283, CVE-2022-24505."
|
"value": "Windows ALPC Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -174,12 +174,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23287",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23287",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23288",
|
"id": "CVE-2022-23288",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.100",
|
"published": "2022-03-09T17:15:12.100",
|
||||||
"lastModified": "2022-05-23T17:29:19.220",
|
"lastModified": "2023-06-29T02:15:11.167",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23291."
|
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -153,12 +153,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23288",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23288",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23290",
|
"id": "CVE-2022-23290",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.197",
|
"published": "2022-03-09T17:15:12.197",
|
||||||
"lastModified": "2022-05-23T17:29:19.230",
|
"lastModified": "2023-06-29T02:15:11.243",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Inking COM Elevation of Privilege Vulnerability."
|
"value": "Windows Inking COM Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -209,12 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23290",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23290",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23291",
|
"id": "CVE-2022-23291",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.283",
|
"published": "2022-03-09T17:15:12.283",
|
||||||
"lastModified": "2022-05-23T17:29:19.250",
|
"lastModified": "2023-06-29T02:15:11.330",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23288."
|
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -159,12 +159,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23291",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23291",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23293",
|
"id": "CVE-2022-23293",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.380",
|
"published": "2022-03-09T17:15:12.380",
|
||||||
"lastModified": "2022-05-23T17:29:19.260",
|
"lastModified": "2023-06-29T02:15:11.417",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Fast FAT File System Driver Elevation of Privilege Vulnerability."
|
"value": "Windows Fast FAT File System Driver Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -209,12 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23293",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23293",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23294",
|
"id": "CVE-2022-23294",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.463",
|
"published": "2022-03-09T17:15:12.463",
|
||||||
"lastModified": "2022-05-23T17:29:19.290",
|
"lastModified": "2023-06-29T02:15:11.500",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Event Tracing Remote Code Execution Vulnerability."
|
"value": "Windows Event Tracing Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -194,12 +194,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23294",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23294",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23295",
|
"id": "CVE-2022-23295",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.550",
|
"published": "2022-03-09T17:15:12.550",
|
||||||
"lastModified": "2022-03-14T17:59:14.877",
|
"lastModified": "2023-06-29T02:15:11.583",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Raw Image Extension Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-23300."
|
"value": "Raw Image Extension Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23295",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23295",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23296",
|
"id": "CVE-2022-23296",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.640",
|
"published": "2022-03-09T17:15:12.640",
|
||||||
"lastModified": "2022-05-23T17:29:19.300",
|
"lastModified": "2023-06-29T02:15:11.663",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Installer Elevation of Privilege Vulnerability."
|
"value": "Windows Installer Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -209,19 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0017/MNDT-2022-0017.md",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23296",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23296",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23297",
|
"id": "CVE-2022-23297",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.740",
|
"published": "2022-03-09T17:15:12.740",
|
||||||
"lastModified": "2022-05-23T17:29:19.330",
|
"lastModified": "2023-06-29T02:15:11.747",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability."
|
"value": "Windows NT Lan Manager Datagram Receiver Driver Information Disclosure Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -209,12 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23297",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23297",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23298",
|
"id": "CVE-2022-23298",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.830",
|
"published": "2022-03-09T17:15:12.830",
|
||||||
"lastModified": "2022-05-23T17:29:19.350",
|
"lastModified": "2023-06-29T02:15:11.833",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows NT OS Kernel Elevation of Privilege Vulnerability."
|
"value": "Windows NT OS Kernel Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -213,12 +213,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23298",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23298",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23299",
|
"id": "CVE-2022-23299",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:12.923",
|
"published": "2022-03-09T17:15:12.923",
|
||||||
"lastModified": "2022-05-23T17:29:19.370",
|
"lastModified": "2023-06-29T02:15:11.923",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows PDEV Elevation of Privilege Vulnerability."
|
"value": "Windows PDEV Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -209,12 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23299",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23299",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23300",
|
"id": "CVE-2022-23300",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.023",
|
"published": "2022-03-09T17:15:13.023",
|
||||||
"lastModified": "2022-03-14T18:22:27.540",
|
"lastModified": "2023-06-29T02:15:12.017",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Raw Image Extension Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-23295."
|
"value": "Raw Image Extension Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23300",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23300",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-23301",
|
"id": "CVE-2022-23301",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.113",
|
"published": "2022-03-09T17:15:13.113",
|
||||||
"lastModified": "2022-03-14T18:23:21.120",
|
"lastModified": "2023-06-29T02:15:12.107",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22006, CVE-2022-22007, CVE-2022-24452, CVE-2022-24453, CVE-2022-24456."
|
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23301",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23301",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24451",
|
"id": "CVE-2022-24451",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.210",
|
"published": "2022-03-09T17:15:13.210",
|
||||||
"lastModified": "2022-03-14T18:26:58.170",
|
"lastModified": "2023-06-29T02:15:12.187",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "VP9 Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24501."
|
"value": "VP9 Video Extensions Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24451",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24451",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24452",
|
"id": "CVE-2022-24452",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.297",
|
"published": "2022-03-09T17:15:13.297",
|
||||||
"lastModified": "2022-03-14T18:28:38.043",
|
"lastModified": "2023-06-29T02:15:12.267",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22006, CVE-2022-22007, CVE-2022-23301, CVE-2022-24453, CVE-2022-24456."
|
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24452",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24452",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24453",
|
"id": "CVE-2022-24453",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.397",
|
"published": "2022-03-09T17:15:13.397",
|
||||||
"lastModified": "2022-03-14T18:29:46.547",
|
"lastModified": "2023-06-29T02:15:12.350",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22006, CVE-2022-22007, CVE-2022-23301, CVE-2022-24452, CVE-2022-24456."
|
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -115,19 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0014/MNDT-2022-0014.md",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24453",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24453",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24454",
|
"id": "CVE-2022-24454",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.497",
|
"published": "2022-03-09T17:15:13.497",
|
||||||
"lastModified": "2022-05-23T17:29:19.393",
|
"lastModified": "2023-06-29T02:15:12.420",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Security Support Provider Interface Elevation of Privilege Vulnerability."
|
"value": "Windows Security Support Provider Interface Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -204,12 +204,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24454",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24454",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24455",
|
"id": "CVE-2022-24455",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.587",
|
"published": "2022-03-09T17:15:13.587",
|
||||||
"lastModified": "2022-03-14T18:41:00.733",
|
"lastModified": "2023-06-29T02:15:12.503",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows CD-ROM Driver Elevation of Privilege Vulnerability."
|
"value": "Windows CD-ROM Driver Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -159,12 +159,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24455",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24455",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24456",
|
"id": "CVE-2022-24456",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.673",
|
"published": "2022-03-09T17:15:13.673",
|
||||||
"lastModified": "2022-03-14T18:44:13.907",
|
"lastModified": "2023-06-29T02:15:12.580",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "HEVC Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22006, CVE-2022-22007, CVE-2022-23301, CVE-2022-24452, CVE-2022-24453."
|
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -115,19 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0015/MNDT-2022-0015.md",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24456",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24456",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24457",
|
"id": "CVE-2022-24457",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.770",
|
"published": "2022-03-09T17:15:13.770",
|
||||||
"lastModified": "2022-03-14T18:45:11.247",
|
"lastModified": "2023-06-29T02:15:12.663",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "HEIF Image Extensions Remote Code Execution Vulnerability."
|
"value": "HEIF Image Extensions Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -115,19 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0016/MNDT-2022-0016.md",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24457",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24457",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24459",
|
"id": "CVE-2022-24459",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.867",
|
"published": "2022-03-09T17:15:13.867",
|
||||||
"lastModified": "2022-05-23T17:29:19.410",
|
"lastModified": "2023-06-29T02:15:12.767",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Fax and Scan Service Elevation of Privilege Vulnerability."
|
"value": "Windows Fax and Scan Service Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -209,12 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24459",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24459",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24460",
|
"id": "CVE-2022-24460",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:13.950",
|
"published": "2022-03-09T17:15:13.950",
|
||||||
"lastModified": "2022-05-23T17:29:19.430",
|
"lastModified": "2023-06-29T02:15:12.843",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Tablet Windows User Interface Application Elevation of Privilege Vulnerability."
|
"value": "Tablet Windows User Interface Application Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -178,12 +178,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24460",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24460",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24461",
|
"id": "CVE-2022-24461",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.037",
|
"published": "2022-03-09T17:15:14.037",
|
||||||
"lastModified": "2022-03-14T18:52:23.793",
|
"lastModified": "2023-06-29T02:15:12.927",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24509, CVE-2022-24510."
|
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -104,12 +104,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24461",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24461",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24462",
|
"id": "CVE-2022-24462",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.127",
|
"published": "2022-03-09T17:15:14.127",
|
||||||
"lastModified": "2022-03-14T18:53:09.590",
|
"lastModified": "2023-06-29T02:15:13.013",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Word Security Feature Bypass Vulnerability."
|
"value": "Microsoft Word Security Feature Bypass Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -104,12 +104,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24462",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24462",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24463",
|
"id": "CVE-2022-24463",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.200",
|
"published": "2022-03-09T17:15:14.200",
|
||||||
"lastModified": "2022-03-14T18:54:39.350",
|
"lastModified": "2023-06-29T02:15:13.107",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Exchange Server Spoofing Vulnerability."
|
"value": "Microsoft Exchange Server Spoofing Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -109,12 +109,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24463",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24463",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24464",
|
"id": "CVE-2022-24464",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.277",
|
"published": "2022-03-09T17:15:14.277",
|
||||||
"lastModified": "2022-05-12T16:26:56.323",
|
"lastModified": "2023-06-29T02:15:13.200",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": ".NET and Visual Studio Denial of Service Vulnerability."
|
"value": ".NET and Visual Studio Denial of Service Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -184,60 +184,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24464",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24464",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24465",
|
"id": "CVE-2022-24465",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.377",
|
"published": "2022-03-09T17:15:14.377",
|
||||||
"lastModified": "2022-03-14T19:00:03.473",
|
"lastModified": "2023-06-29T02:15:13.323",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Intune Portal for iOS Security Feature Bypass Vulnerability."
|
"value": "Microsoft Intune Portal for iOS Security Feature Bypass Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 5.5,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.8,
|
|
||||||
"impactScore": 3.6
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -114,12 +114,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24465",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24465",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24467",
|
"id": "CVE-2022-24467",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.477",
|
"published": "2022-03-09T17:15:14.477",
|
||||||
"lastModified": "2022-03-14T17:37:59.113",
|
"lastModified": "2023-06-29T02:15:13.437",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24517, CVE-2022-24520."
|
"value": "Azure Site Recovery Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -95,12 +95,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24467",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24467",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24468",
|
"id": "CVE-2022-24468",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.560",
|
"published": "2022-03-09T17:15:14.560",
|
||||||
"lastModified": "2022-03-14T17:38:27.087",
|
"lastModified": "2023-06-29T02:15:13.513",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24470, CVE-2022-24471, CVE-2022-24517, CVE-2022-24520."
|
"value": "Azure Site Recovery Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -95,12 +95,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24468",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24468",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24469",
|
"id": "CVE-2022-24469",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.637",
|
"published": "2022-03-09T17:15:14.637",
|
||||||
"lastModified": "2022-03-14T17:39:36.880",
|
"lastModified": "2023-06-29T02:15:13.587",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24506, CVE-2022-24515, CVE-2022-24518, CVE-2022-24519."
|
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "LOW",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"availabilityImpact": "HIGH",
|
|
||||||
"baseScore": 8.8,
|
|
||||||
"baseSeverity": "HIGH"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 2.8,
|
|
||||||
"impactScore": 5.9
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "LOW",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 8.8,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24469",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24469",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24470",
|
"id": "CVE-2022-24470",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.723",
|
"published": "2022-03-09T17:15:14.723",
|
||||||
"lastModified": "2022-03-14T17:40:18.880",
|
"lastModified": "2023-06-29T02:15:13.673",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24471, CVE-2022-24517, CVE-2022-24520."
|
"value": "Azure Site Recovery Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -95,12 +95,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24470",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24470",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24471",
|
"id": "CVE-2022-24471",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.803",
|
"published": "2022-03-09T17:15:14.803",
|
||||||
"lastModified": "2022-03-14T17:42:30.853",
|
"lastModified": "2023-06-29T02:15:13.770",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24517, CVE-2022-24520."
|
"value": "Azure Site Recovery Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24471",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24471",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24501",
|
"id": "CVE-2022-24501",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.880",
|
"published": "2022-03-09T17:15:14.880",
|
||||||
"lastModified": "2022-03-14T19:01:26.063",
|
"lastModified": "2023-06-29T02:15:13.857",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "VP9 Video Extensions Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24451."
|
"value": "VP9 Video Extensions Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -94,12 +94,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24501",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24501",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24502",
|
"id": "CVE-2022-24502",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:14.957",
|
"published": "2022-03-09T17:15:14.957",
|
||||||
"lastModified": "2022-05-23T17:29:19.443",
|
"lastModified": "2023-06-29T02:15:13.947",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows HTML Platforms Security Feature Bypass Vulnerability."
|
"value": "Windows HTML Platforms Security Feature Bypass Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 6.5,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 2.8,
|
|
||||||
"impactScore": 3.6
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 1.4
|
"impactScore": 1.4
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -209,12 +209,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24502",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24502",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24503",
|
"id": "CVE-2022-24503",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.043",
|
"published": "2022-03-09T17:15:15.043",
|
||||||
"lastModified": "2022-05-23T17:29:19.480",
|
"lastModified": "2023-06-29T02:15:14.030",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Remote Desktop Protocol Client Information Disclosure Vulnerability."
|
"value": "Remote Desktop Protocol Client Information Disclosure Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "LOW",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 5.3,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 3.9,
|
|
||||||
"impactScore": 1.4
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 2.5
|
"impactScore": 2.5
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 1.4
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -210,12 +210,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24503",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24503",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24505",
|
"id": "CVE-2022-24505",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.127",
|
"published": "2022-03-09T17:15:15.127",
|
||||||
"lastModified": "2022-05-23T17:29:19.500",
|
"lastModified": "2023-06-29T02:15:14.133",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows ALPC Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-23283, CVE-2022-23287."
|
"value": "Windows ALPC Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -154,12 +154,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24505",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24505",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24506",
|
"id": "CVE-2022-24506",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.210",
|
"published": "2022-03-09T17:15:15.210",
|
||||||
"lastModified": "2022-03-16T00:27:51.847",
|
"lastModified": "2023-06-29T02:15:14.257",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24469, CVE-2022-24515, CVE-2022-24518, CVE-2022-24519."
|
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "HIGH",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"availabilityImpact": "HIGH",
|
|
||||||
"baseScore": 7.2,
|
|
||||||
"baseSeverity": "HIGH"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.2,
|
|
||||||
"impactScore": 5.9
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24506",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24506",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24507",
|
"id": "CVE-2022-24507",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.293",
|
"published": "2022-03-09T17:15:15.293",
|
||||||
"lastModified": "2022-05-23T17:29:19.517",
|
"lastModified": "2023-06-29T02:15:14.337",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability."
|
"value": "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -144,12 +144,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24507",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24507",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24508",
|
"id": "CVE-2022-24508",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.387",
|
"published": "2022-03-09T17:15:15.387",
|
||||||
"lastModified": "2022-05-23T17:29:19.527",
|
"lastModified": "2023-06-29T02:15:14.417",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows SMBv3 Client/Server Remote Code Execution Vulnerability."
|
"value": "Win32 File Enumeration Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -119,12 +119,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24508",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24508",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24509",
|
"id": "CVE-2022-24509",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.473",
|
"published": "2022-03-09T17:15:15.473",
|
||||||
"lastModified": "2022-03-16T00:24:06.540",
|
"lastModified": "2023-06-29T02:15:14.510",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24461, CVE-2022-24510."
|
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -104,12 +104,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24509",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24509",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24510",
|
"id": "CVE-2022-24510",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.563",
|
"published": "2022-03-09T17:15:15.563",
|
||||||
"lastModified": "2022-03-16T00:21:48.440",
|
"lastModified": "2023-06-29T02:15:14.597",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Office Visio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24461, CVE-2022-24509."
|
"value": "Microsoft Office Visio Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -104,12 +104,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24510",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24510",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24511",
|
"id": "CVE-2022-24511",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.650",
|
"published": "2022-03-09T17:15:15.650",
|
||||||
"lastModified": "2022-03-16T00:15:43.370",
|
"lastModified": "2023-06-29T02:15:14.683",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Microsoft Office Word Tampering Vulnerability."
|
"value": "Microsoft Office Word Tampering Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 5.5,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.8,
|
|
||||||
"impactScore": 3.6
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.8,
|
"exploitabilityScore": 1.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -134,12 +134,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24511",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24511",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24512",
|
"id": "CVE-2022-24512",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.737",
|
"published": "2022-03-09T17:15:15.737",
|
||||||
"lastModified": "2023-04-17T18:52:38.160",
|
"lastModified": "2023-06-29T02:15:14.777",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": ".NET and Visual Studio Remote Code Execution Vulnerability."
|
"value": ".NET and Visual Studio Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -219,60 +219,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4TOGTZ2ZWDH662ZNFFSZVL3M5AJXV6JF/",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24512",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CIJGCVKLHVNLFBTEYJGWS43QG5DYJFBL/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQLM7ABVCYJLF6JRPF3M3EBXW63GNC27/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MRGSPXMZY4RM2L35FYHCXBFROLC23B2V/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OS2Q4NPRSARP7GHLKFLIYHFOPSYDO6MK/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZXEQ3GQVELA2T4HNZG7VPMS2HDVXMJRG/",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Mailing List",
|
|
||||||
"Third Party Advisory"
|
|
||||||
]
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24512",
|
|
||||||
"source": "secure@microsoft.com",
|
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24515",
|
"id": "CVE-2022-24515",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.807",
|
"published": "2022-03-09T17:15:15.807",
|
||||||
"lastModified": "2022-05-26T16:31:56.463",
|
"lastModified": "2023-06-29T02:15:14.877",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24469, CVE-2022-24506, CVE-2022-24518, CVE-2022-24519."
|
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "HIGH",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"availabilityImpact": "HIGH",
|
|
||||||
"baseScore": 7.2,
|
|
||||||
"baseSeverity": "HIGH"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.2,
|
|
||||||
"impactScore": 5.9
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 7.2,
|
||||||
|
"baseSeverity": "HIGH"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.9
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24515",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24515",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24517",
|
"id": "CVE-2022-24517",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.897",
|
"published": "2022-03-09T17:15:15.897",
|
||||||
"lastModified": "2022-03-14T17:57:02.870",
|
"lastModified": "2023-06-29T02:15:14.997",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24520."
|
"value": "Azure Site Recovery Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -95,12 +95,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24517",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24517",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24518",
|
"id": "CVE-2022-24518",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:15.983",
|
"published": "2022-03-09T17:15:15.983",
|
||||||
"lastModified": "2022-03-14T17:56:30.730",
|
"lastModified": "2023-06-29T02:15:15.077",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24469, CVE-2022-24506, CVE-2022-24515, CVE-2022-24519."
|
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "HIGH",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 4.9,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.2,
|
|
||||||
"impactScore": 3.6
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24518",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24518",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24519",
|
"id": "CVE-2022-24519",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:16.070",
|
"published": "2022-03-09T17:15:16.070",
|
||||||
"lastModified": "2022-03-14T17:44:12.617",
|
"lastModified": "2023-06-29T02:15:15.167",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-24469, CVE-2022-24506, CVE-2022-24515, CVE-2022-24518."
|
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
|
||||||
"attackVector": "NETWORK",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "HIGH",
|
|
||||||
"userInteraction": "NONE",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "HIGH",
|
|
||||||
"integrityImpact": "NONE",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 4.9,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.2,
|
|
||||||
"impactScore": 3.6
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 1.2,
|
"exploitabilityScore": 1.2,
|
||||||
"impactScore": 5.2
|
"impactScore": 5.2
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "NONE",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.9,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24519",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24519",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24520",
|
"id": "CVE-2022-24520",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:16.157",
|
"published": "2022-03-09T17:15:16.157",
|
||||||
"lastModified": "2022-03-14T17:43:03.027",
|
"lastModified": "2023-06-29T02:15:15.267",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24467, CVE-2022-24468, CVE-2022-24470, CVE-2022-24471, CVE-2022-24517."
|
"value": "Azure Site Recovery Remote Code Execution Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -95,12 +95,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24520",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24520",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24522",
|
"id": "CVE-2022-24522",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:16.237",
|
"published": "2022-03-09T17:15:16.237",
|
||||||
"lastModified": "2022-03-15T15:53:09.720",
|
"lastModified": "2023-06-29T02:15:15.360",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Skype Extension for Chrome Information Disclosure Vulnerability."
|
"value": "Skype Extension for Chrome Information Disclosure Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,23 +37,23 @@
|
|||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||||
"attackVector": "NETWORK",
|
"attackVector": "NETWORK",
|
||||||
"attackComplexity": "LOW",
|
"attackComplexity": "LOW",
|
||||||
"privilegesRequired": "NONE",
|
"privilegesRequired": "NONE",
|
||||||
"userInteraction": "NONE",
|
"userInteraction": "REQUIRED",
|
||||||
"scope": "UNCHANGED",
|
"scope": "UNCHANGED",
|
||||||
"confidentialityImpact": "HIGH",
|
"confidentialityImpact": "HIGH",
|
||||||
"integrityImpact": "NONE",
|
"integrityImpact": "NONE",
|
||||||
"availabilityImpact": "NONE",
|
"availabilityImpact": "NONE",
|
||||||
"baseScore": 7.5,
|
"baseScore": 6.5,
|
||||||
"baseSeverity": "HIGH"
|
"baseSeverity": "MEDIUM"
|
||||||
},
|
},
|
||||||
"exploitabilityScore": 3.9,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 3.6
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24522",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24522",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24525",
|
"id": "CVE-2022-24525",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:16.290",
|
"published": "2022-03-09T17:15:16.290",
|
||||||
"lastModified": "2022-05-23T17:29:19.533",
|
"lastModified": "2023-06-29T02:15:15.457",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Windows Update Stack Elevation of Privilege Vulnerability."
|
"value": "Windows Update Stack Elevation of Privilege Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -17,7 +17,7 @@
|
|||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
{
|
||||||
"source": "nvd@nist.gov",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Primary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -37,7 +37,7 @@
|
|||||||
"impactScore": 5.9
|
"impactScore": 5.9
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "nvd@nist.gov",
|
||||||
"type": "Secondary",
|
"type": "Secondary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
@ -144,12 +144,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24525",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24525",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -2,12 +2,12 @@
|
|||||||
"id": "CVE-2022-24526",
|
"id": "CVE-2022-24526",
|
||||||
"sourceIdentifier": "secure@microsoft.com",
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
"published": "2022-03-09T17:15:16.350",
|
"published": "2022-03-09T17:15:16.350",
|
||||||
"lastModified": "2022-03-15T15:42:56.767",
|
"lastModified": "2023-06-29T02:15:15.557",
|
||||||
"vulnStatus": "Analyzed",
|
"vulnStatus": "Modified",
|
||||||
"descriptions": [
|
"descriptions": [
|
||||||
{
|
{
|
||||||
"lang": "en",
|
"lang": "en",
|
||||||
"value": "Visual Studio Code Spoofing Vulnerability."
|
"value": "Visual Studio Code Spoofing Vulnerability"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"lang": "es",
|
"lang": "es",
|
||||||
@ -16,29 +16,9 @@
|
|||||||
],
|
],
|
||||||
"metrics": {
|
"metrics": {
|
||||||
"cvssMetricV31": [
|
"cvssMetricV31": [
|
||||||
{
|
|
||||||
"source": "nvd@nist.gov",
|
|
||||||
"type": "Primary",
|
|
||||||
"cvssData": {
|
|
||||||
"version": "3.1",
|
|
||||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
||||||
"attackVector": "LOCAL",
|
|
||||||
"attackComplexity": "LOW",
|
|
||||||
"privilegesRequired": "NONE",
|
|
||||||
"userInteraction": "REQUIRED",
|
|
||||||
"scope": "UNCHANGED",
|
|
||||||
"confidentialityImpact": "NONE",
|
|
||||||
"integrityImpact": "HIGH",
|
|
||||||
"availabilityImpact": "NONE",
|
|
||||||
"baseScore": 5.5,
|
|
||||||
"baseSeverity": "MEDIUM"
|
|
||||||
},
|
|
||||||
"exploitabilityScore": 1.8,
|
|
||||||
"impactScore": 3.6
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com",
|
||||||
"type": "Secondary",
|
"type": "Primary",
|
||||||
"cvssData": {
|
"cvssData": {
|
||||||
"version": "3.1",
|
"version": "3.1",
|
||||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||||
@ -55,6 +35,26 @@
|
|||||||
},
|
},
|
||||||
"exploitabilityScore": 2.8,
|
"exploitabilityScore": 2.8,
|
||||||
"impactScore": 2.7
|
"impactScore": 2.7
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"source": "nvd@nist.gov",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||||
|
"attackVector": "LOCAL",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 5.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.8,
|
||||||
|
"impactScore": 3.6
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"cvssMetricV2": [
|
"cvssMetricV2": [
|
||||||
@ -115,12 +115,8 @@
|
|||||||
],
|
],
|
||||||
"references": [
|
"references": [
|
||||||
{
|
{
|
||||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-24526",
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24526",
|
||||||
"source": "secure@microsoft.com",
|
"source": "secure@microsoft.com"
|
||||||
"tags": [
|
|
||||||
"Patch",
|
|
||||||
"Vendor Advisory"
|
|
||||||
]
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
43
CVE-2022/CVE-2022-268xx/CVE-2022-26899.json
Normal file
43
CVE-2022/CVE-2022-268xx/CVE-2022-26899.json
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-26899",
|
||||||
|
"sourceIdentifier": "secure@microsoft.com",
|
||||||
|
"published": "2023-06-29T02:15:15.657",
|
||||||
|
"lastModified": "2023-06-29T02:15:15.657",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "secure@microsoft.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "REQUIRED",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "LOW",
|
||||||
|
"baseScore": 6.3,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 2.8,
|
||||||
|
"impactScore": 3.4
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26899",
|
||||||
|
"source": "secure@microsoft.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2022/CVE-2022-464xx/CVE-2022-46407.json
Normal file
20
CVE-2022/CVE-2022-464xx/CVE-2022-46407.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-46407",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-06-29T02:15:15.827",
|
||||||
|
"lastModified": "2023-06-29T02:15:15.827",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Ericsson Network Manager (ENM), versions prior to 22.2, contains a vulnerability in the REST endpoint \u201ceditprofile\u201d where Open Redirect HTTP Header Injection can lead to redirection of the submitted request to domain out of control of ENM deployment. The attacker would need admin/elevated access to exploit the vulnerability"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2022/CVE-2022-464xx/CVE-2022-46408.json
Normal file
20
CVE-2022/CVE-2022-464xx/CVE-2022-46408.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2022-46408",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-06-29T03:15:09.357",
|
||||||
|
"lastModified": "2023-06-29T03:15:09.357",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Ericsson Network Manager (ENM), versions prior to 22.1, contains a vulnerability in the application Network Connectivity Manager (NCM) where improper Neutralization of Formula Elements in a CSV File can lead to remote code execution or data leakage via maliciously injected hyperlinks. The attacker would need admin/elevated access to exploit the vulnerability."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.gruppotim.it/it/footer/red-team.html",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
63
CVE-2023/CVE-2023-16xx/CVE-2023-1602.json
Normal file
63
CVE-2023/CVE-2023-16xx/CVE-2023-1602.json
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-1602",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-06-29T02:15:15.937",
|
||||||
|
"lastModified": "2023-06-29T02:15:15.937",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The Short URL plugin for WordPress is vulnerable to stored Cross-Site Scripting via the 'comment' parameter due to insufficient input sanitization and output escaping in versions up to, and including, 1.6.4. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "HIGH",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "CHANGED",
|
||||||
|
"confidentialityImpact": "LOW",
|
||||||
|
"integrityImpact": "LOW",
|
||||||
|
"availabilityImpact": "NONE",
|
||||||
|
"baseScore": 4.4,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.3,
|
||||||
|
"impactScore": 2.7
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-79"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/2931815/shorten-url/trunk/shorten-url.php",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://wordpress.org/plugins/shorten-url/#developers",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a5f29f35-da79-4389-a0a5-a1be0b0b8996?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
71
CVE-2023/CVE-2023-29xx/CVE-2023-2982.json
Normal file
71
CVE-2023/CVE-2023-29xx/CVE-2023-2982.json
Normal file
@ -0,0 +1,71 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-2982",
|
||||||
|
"sourceIdentifier": "security@wordfence.com",
|
||||||
|
"published": "2023-06-29T02:15:16.103",
|
||||||
|
"lastModified": "2023-06-29T02:15:16.103",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The WordPress Social Login and Register (Discord, Google, Twitter, LinkedIn) plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 7.6.4. This is due to insufficient encryption on the user being supplied during a login validated through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they know the email address associated with that user. This was partially patched in version 7.6.4 and fully patched in version 7.6.5."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "NONE",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "HIGH",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 9.8,
|
||||||
|
"baseSeverity": "CRITICAL"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 3.9,
|
||||||
|
"impactScore": 5.9
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"weaknesses": [
|
||||||
|
{
|
||||||
|
"source": "security@wordfence.com",
|
||||||
|
"type": "Primary",
|
||||||
|
"description": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "CWE-288"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://lana.codes/lanavdb/2326f41f-a39f-4fde-8627-9d29fff91443/",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/browser/miniorange-login-openid/trunk/mo-openid-social-login-functions.php#L107",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/2924863/miniorange-login-openid",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://plugins.trac.wordpress.org/changeset/2925914/miniorange-login-openid",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08ca186a-2486-4a58-9c53-03e9eba13e66?source=cve",
|
||||||
|
"source": "security@wordfence.com"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2023/CVE-2023-346xx/CVE-2023-34648.json
Normal file
20
CVE-2023/CVE-2023-346xx/CVE-2023-34648.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-34648",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-06-29T03:15:09.423",
|
||||||
|
"lastModified": "2023-06-29T03:15:09.423",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A Cross Site Scripting vulnerability in PHPgurukl User Registration Login and User Management System with admin panel v.1.0 allows a local attacker to execute arbitrary code via a crafted script to the signup.php."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/ckalnarayan/Common-Vulnerabilities-and-Exposures/blob/main/CVE-2023-34648",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
20
CVE-2023/CVE-2023-347xx/CVE-2023-34734.json
Normal file
20
CVE-2023/CVE-2023-347xx/CVE-2023-34734.json
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-34734",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-06-29T03:15:09.470",
|
||||||
|
"lastModified": "2023-06-29T03:15:09.470",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "Annet AC Centralized Management Platform 1.02.040 is vulnerable to Stored Cross-Site Scripting (XSS) ."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/prismbreak/vulnerabilities/issues/3",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2023/CVE-2023-348xx/CVE-2023-34831.json
Normal file
24
CVE-2023/CVE-2023-348xx/CVE-2023-34831.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-34831",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-06-29T03:15:09.517",
|
||||||
|
"lastModified": "2023-06-29T03:15:09.517",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "The \"Submission Web Form\" of Turnitin LTI tool/plugin version 1.3 is affected by HTML Injection attacks. The security issue affects the submission web form (\"id\" and \"title\" HTTP POST parameters) where the students submit their reports for similarity/plagiarism checks."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://github.com/IthacaLabs/Turnitin/blob/main/Turnitin_LTI_1.3_HTMLi_CVE-2023-34831/Turnitin_LTI_1.3_HTMLi_CVE-2023-34831.txt",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://github.com/IthacaLabs/Turnitin/blob/main/Turnitin_Submission_Web_Form/",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
24
CVE-2023/CVE-2023-348xx/CVE-2023-34834.json
Normal file
24
CVE-2023/CVE-2023-348xx/CVE-2023-34834.json
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-34834",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-06-29T03:15:09.563",
|
||||||
|
"lastModified": "2023-06-29T03:15:09.563",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "A Directory Browsing vulnerability in MCL-Net version 4.3.5.8788 webserver running on default port 5080, allows attackers to gain sensitive information about the configured databases via the \"/file\" endpoint."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "http://www.mclv4.mcl-collection.com/index.php",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"url": "https://www.exploit-db.com/exploits/51542",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
43
CVE-2023/CVE-2023-372xx/CVE-2023-37237.json
Normal file
43
CVE-2023/CVE-2023-372xx/CVE-2023-37237.json
Normal file
@ -0,0 +1,43 @@
|
|||||||
|
{
|
||||||
|
"id": "CVE-2023-37237",
|
||||||
|
"sourceIdentifier": "cve@mitre.org",
|
||||||
|
"published": "2023-06-29T02:15:16.207",
|
||||||
|
"lastModified": "2023-06-29T02:15:16.207",
|
||||||
|
"vulnStatus": "Received",
|
||||||
|
"descriptions": [
|
||||||
|
{
|
||||||
|
"lang": "en",
|
||||||
|
"value": "In Veritas NetBackup Appliance before 4.1.0.1 MR3, insecure permissions may allow an authenticated Admin to bypass shell restrictions and execute arbitrary operating system commands via SSH."
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"metrics": {
|
||||||
|
"cvssMetricV31": [
|
||||||
|
{
|
||||||
|
"source": "cve@mitre.org",
|
||||||
|
"type": "Secondary",
|
||||||
|
"cvssData": {
|
||||||
|
"version": "3.1",
|
||||||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
|
||||||
|
"attackVector": "NETWORK",
|
||||||
|
"attackComplexity": "LOW",
|
||||||
|
"privilegesRequired": "HIGH",
|
||||||
|
"userInteraction": "NONE",
|
||||||
|
"scope": "UNCHANGED",
|
||||||
|
"confidentialityImpact": "NONE",
|
||||||
|
"integrityImpact": "HIGH",
|
||||||
|
"availabilityImpact": "HIGH",
|
||||||
|
"baseScore": 6.5,
|
||||||
|
"baseSeverity": "MEDIUM"
|
||||||
|
},
|
||||||
|
"exploitabilityScore": 1.2,
|
||||||
|
"impactScore": 5.2
|
||||||
|
}
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"references": [
|
||||||
|
{
|
||||||
|
"url": "https://www.veritas.com/content/support/en_US/security/VTS23-004",
|
||||||
|
"source": "cve@mitre.org"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
78
README.md
78
README.md
@ -9,13 +9,13 @@ Repository synchronizes with the NVD every 2 hours.
|
|||||||
### Last Repository Update
|
### Last Repository Update
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-06-29T02:00:31.226986+00:00
|
2023-06-29T04:00:26.718571+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
2023-06-29T01:15:51.267000+00:00
|
2023-06-29T03:15:09.563000+00:00
|
||||||
```
|
```
|
||||||
|
|
||||||
### Last Data Feed Release
|
### Last Data Feed Release
|
||||||
@ -29,52 +29,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
|||||||
### Total Number of included CVEs
|
### Total Number of included CVEs
|
||||||
|
|
||||||
```plain
|
```plain
|
||||||
218856
|
218866
|
||||||
```
|
```
|
||||||
|
|
||||||
### CVEs added in the last Commit
|
### CVEs added in the last Commit
|
||||||
|
|
||||||
Recently added CVEs: `8`
|
Recently added CVEs: `10`
|
||||||
|
|
||||||
* [CVE-2022-29144](CVE-2022/CVE-2022-291xx/CVE-2022-29144.json) (`2023-06-29T01:15:49.663`)
|
* [CVE-2022-26899](CVE-2022/CVE-2022-268xx/CVE-2022-26899.json) (`2023-06-29T02:15:15.657`)
|
||||||
* [CVE-2022-29146](CVE-2022/CVE-2022-291xx/CVE-2022-29146.json) (`2023-06-29T01:15:50.000`)
|
* [CVE-2022-46407](CVE-2022/CVE-2022-464xx/CVE-2022-46407.json) (`2023-06-29T02:15:15.827`)
|
||||||
* [CVE-2022-29147](CVE-2022/CVE-2022-291xx/CVE-2022-29147.json) (`2023-06-29T01:15:50.450`)
|
* [CVE-2022-46408](CVE-2022/CVE-2022-464xx/CVE-2022-46408.json) (`2023-06-29T03:15:09.357`)
|
||||||
* [CVE-2023-33661](CVE-2023/CVE-2023-336xx/CVE-2023-33661.json) (`2023-06-29T00:15:09.567`)
|
* [CVE-2023-1602](CVE-2023/CVE-2023-16xx/CVE-2023-1602.json) (`2023-06-29T02:15:15.937`)
|
||||||
* [CVE-2023-34738](CVE-2023/CVE-2023-347xx/CVE-2023-34738.json) (`2023-06-29T00:15:09.620`)
|
* [CVE-2023-2982](CVE-2023/CVE-2023-29xx/CVE-2023-2982.json) (`2023-06-29T02:15:16.103`)
|
||||||
* [CVE-2023-34843](CVE-2023/CVE-2023-348xx/CVE-2023-34843.json) (`2023-06-29T00:15:09.670`)
|
* [CVE-2023-37237](CVE-2023/CVE-2023-372xx/CVE-2023-37237.json) (`2023-06-29T02:15:16.207`)
|
||||||
* [CVE-2023-32610](CVE-2023/CVE-2023-326xx/CVE-2023-32610.json) (`2023-06-29T01:15:50.913`)
|
* [CVE-2023-34648](CVE-2023/CVE-2023-346xx/CVE-2023-34648.json) (`2023-06-29T03:15:09.423`)
|
||||||
* [CVE-2023-36476](CVE-2023/CVE-2023-364xx/CVE-2023-36476.json) (`2023-06-29T01:15:51.267`)
|
* [CVE-2023-34734](CVE-2023/CVE-2023-347xx/CVE-2023-34734.json) (`2023-06-29T03:15:09.470`)
|
||||||
|
* [CVE-2023-34831](CVE-2023/CVE-2023-348xx/CVE-2023-34831.json) (`2023-06-29T03:15:09.517`)
|
||||||
|
* [CVE-2023-34834](CVE-2023/CVE-2023-348xx/CVE-2023-34834.json) (`2023-06-29T03:15:09.563`)
|
||||||
|
|
||||||
|
|
||||||
### CVEs modified in the last Commit
|
### CVEs modified in the last Commit
|
||||||
|
|
||||||
Recently modified CVEs: `124`
|
Recently modified CVEs: `70`
|
||||||
|
|
||||||
* [CVE-2022-26891](CVE-2022/CVE-2022-268xx/CVE-2022-26891.json) (`2023-06-29T01:15:42.250`)
|
* [CVE-2022-24465](CVE-2022/CVE-2022-244xx/CVE-2022-24465.json) (`2023-06-29T02:15:13.323`)
|
||||||
* [CVE-2022-26894](CVE-2022/CVE-2022-268xx/CVE-2022-26894.json) (`2023-06-29T01:15:42.607`)
|
* [CVE-2022-24467](CVE-2022/CVE-2022-244xx/CVE-2022-24467.json) (`2023-06-29T02:15:13.437`)
|
||||||
* [CVE-2022-26895](CVE-2022/CVE-2022-268xx/CVE-2022-26895.json) (`2023-06-29T01:15:43.007`)
|
* [CVE-2022-24468](CVE-2022/CVE-2022-244xx/CVE-2022-24468.json) (`2023-06-29T02:15:13.513`)
|
||||||
* [CVE-2022-26896](CVE-2022/CVE-2022-268xx/CVE-2022-26896.json) (`2023-06-29T01:15:43.333`)
|
* [CVE-2022-24469](CVE-2022/CVE-2022-244xx/CVE-2022-24469.json) (`2023-06-29T02:15:13.587`)
|
||||||
* [CVE-2022-26897](CVE-2022/CVE-2022-268xx/CVE-2022-26897.json) (`2023-06-29T01:15:43.587`)
|
* [CVE-2022-24470](CVE-2022/CVE-2022-244xx/CVE-2022-24470.json) (`2023-06-29T02:15:13.673`)
|
||||||
* [CVE-2022-26898](CVE-2022/CVE-2022-268xx/CVE-2022-26898.json) (`2023-06-29T01:15:43.880`)
|
* [CVE-2022-24471](CVE-2022/CVE-2022-244xx/CVE-2022-24471.json) (`2023-06-29T02:15:13.770`)
|
||||||
* [CVE-2022-26900](CVE-2022/CVE-2022-269xx/CVE-2022-26900.json) (`2023-06-29T01:15:44.453`)
|
* [CVE-2022-24501](CVE-2022/CVE-2022-245xx/CVE-2022-24501.json) (`2023-06-29T02:15:13.857`)
|
||||||
* [CVE-2022-26901](CVE-2022/CVE-2022-269xx/CVE-2022-26901.json) (`2023-06-29T01:15:44.737`)
|
* [CVE-2022-24502](CVE-2022/CVE-2022-245xx/CVE-2022-24502.json) (`2023-06-29T02:15:13.947`)
|
||||||
* [CVE-2022-26903](CVE-2022/CVE-2022-269xx/CVE-2022-26903.json) (`2023-06-29T01:15:45.140`)
|
* [CVE-2022-24503](CVE-2022/CVE-2022-245xx/CVE-2022-24503.json) (`2023-06-29T02:15:14.030`)
|
||||||
* [CVE-2022-26904](CVE-2022/CVE-2022-269xx/CVE-2022-26904.json) (`2023-06-29T01:15:45.370`)
|
* [CVE-2022-24505](CVE-2022/CVE-2022-245xx/CVE-2022-24505.json) (`2023-06-29T02:15:14.133`)
|
||||||
* [CVE-2022-26907](CVE-2022/CVE-2022-269xx/CVE-2022-26907.json) (`2023-06-29T01:15:45.540`)
|
* [CVE-2022-24506](CVE-2022/CVE-2022-245xx/CVE-2022-24506.json) (`2023-06-29T02:15:14.257`)
|
||||||
* [CVE-2022-26908](CVE-2022/CVE-2022-269xx/CVE-2022-26908.json) (`2023-06-29T01:15:45.777`)
|
* [CVE-2022-24507](CVE-2022/CVE-2022-245xx/CVE-2022-24507.json) (`2023-06-29T02:15:14.337`)
|
||||||
* [CVE-2022-26909](CVE-2022/CVE-2022-269xx/CVE-2022-26909.json) (`2023-06-29T01:15:46.053`)
|
* [CVE-2022-24508](CVE-2022/CVE-2022-245xx/CVE-2022-24508.json) (`2023-06-29T02:15:14.417`)
|
||||||
* [CVE-2022-26910](CVE-2022/CVE-2022-269xx/CVE-2022-26910.json) (`2023-06-29T01:15:46.310`)
|
* [CVE-2022-24509](CVE-2022/CVE-2022-245xx/CVE-2022-24509.json) (`2023-06-29T02:15:14.510`)
|
||||||
* [CVE-2022-26911](CVE-2022/CVE-2022-269xx/CVE-2022-26911.json) (`2023-06-29T01:15:46.623`)
|
* [CVE-2022-24510](CVE-2022/CVE-2022-245xx/CVE-2022-24510.json) (`2023-06-29T02:15:14.597`)
|
||||||
* [CVE-2022-26912](CVE-2022/CVE-2022-269xx/CVE-2022-26912.json) (`2023-06-29T01:15:46.863`)
|
* [CVE-2022-24511](CVE-2022/CVE-2022-245xx/CVE-2022-24511.json) (`2023-06-29T02:15:14.683`)
|
||||||
* [CVE-2022-26914](CVE-2022/CVE-2022-269xx/CVE-2022-26914.json) (`2023-06-29T01:15:47.143`)
|
* [CVE-2022-24512](CVE-2022/CVE-2022-245xx/CVE-2022-24512.json) (`2023-06-29T02:15:14.777`)
|
||||||
* [CVE-2022-26915](CVE-2022/CVE-2022-269xx/CVE-2022-26915.json) (`2023-06-29T01:15:47.453`)
|
* [CVE-2022-24515](CVE-2022/CVE-2022-245xx/CVE-2022-24515.json) (`2023-06-29T02:15:14.877`)
|
||||||
* [CVE-2022-26916](CVE-2022/CVE-2022-269xx/CVE-2022-26916.json) (`2023-06-29T01:15:47.683`)
|
* [CVE-2022-24517](CVE-2022/CVE-2022-245xx/CVE-2022-24517.json) (`2023-06-29T02:15:14.997`)
|
||||||
* [CVE-2022-26917](CVE-2022/CVE-2022-269xx/CVE-2022-26917.json) (`2023-06-29T01:15:47.850`)
|
* [CVE-2022-24518](CVE-2022/CVE-2022-245xx/CVE-2022-24518.json) (`2023-06-29T02:15:15.077`)
|
||||||
* [CVE-2022-26918](CVE-2022/CVE-2022-269xx/CVE-2022-26918.json) (`2023-06-29T01:15:48.103`)
|
* [CVE-2022-24519](CVE-2022/CVE-2022-245xx/CVE-2022-24519.json) (`2023-06-29T02:15:15.167`)
|
||||||
* [CVE-2022-26919](CVE-2022/CVE-2022-269xx/CVE-2022-26919.json) (`2023-06-29T01:15:48.303`)
|
* [CVE-2022-24520](CVE-2022/CVE-2022-245xx/CVE-2022-24520.json) (`2023-06-29T02:15:15.267`)
|
||||||
* [CVE-2022-26920](CVE-2022/CVE-2022-269xx/CVE-2022-26920.json) (`2023-06-29T01:15:48.537`)
|
* [CVE-2022-24522](CVE-2022/CVE-2022-245xx/CVE-2022-24522.json) (`2023-06-29T02:15:15.360`)
|
||||||
* [CVE-2022-26921](CVE-2022/CVE-2022-269xx/CVE-2022-26921.json) (`2023-06-29T01:15:48.897`)
|
* [CVE-2022-24525](CVE-2022/CVE-2022-245xx/CVE-2022-24525.json) (`2023-06-29T02:15:15.457`)
|
||||||
* [CVE-2022-26924](CVE-2022/CVE-2022-269xx/CVE-2022-26924.json) (`2023-06-29T01:15:49.313`)
|
* [CVE-2022-24526](CVE-2022/CVE-2022-245xx/CVE-2022-24526.json) (`2023-06-29T02:15:15.557`)
|
||||||
|
|
||||||
|
|
||||||
## Download and Usage
|
## Download and Usage
|
||||||
|
Loading…
x
Reference in New Issue
Block a user