mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2023-12-20T21:00:24.583487+00:00
This commit is contained in:
parent
46f64c09a4
commit
9578a75dc1
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-1184",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2022-08-29T15:15:10.413",
|
||||
"lastModified": "2023-02-12T22:15:23.433",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-12-20T20:10:36.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -69,8 +69,89 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "2.6.12",
|
||||
"versionEndExcluding": "4.9.138",
|
||||
"matchCriteriaId": "F9C64950-F22D-4306-B3A7-EAE45176299B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "4.14",
|
||||
"versionEndExcluding": "4.14.283",
|
||||
"matchCriteriaId": "710B94A9-F09F-4B18-9D38-0FDBC004BB21"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "4.19",
|
||||
"versionEndExcluding": "4.19.247",
|
||||
"matchCriteriaId": "94240ABF-996C-4B73-8612-9B1102881F8A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "5.4",
|
||||
"versionEndExcluding": "5.4.198",
|
||||
"matchCriteriaId": "226DC59F-A75D-47CE-BAB5-DFA20C8E4A46"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "5.10",
|
||||
"versionEndExcluding": "5.10.121",
|
||||
"matchCriteriaId": "EDEF9A49-C2F9-41C6-9947-52E8D13E4E53"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "5.15",
|
||||
"versionEndExcluding": "5.15.46",
|
||||
"matchCriteriaId": "77578AA5-6692-47CA-BC03-E99D59007463"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "5.17",
|
||||
"versionEndExcluding": "5.17.14",
|
||||
"matchCriteriaId": "597F5F18-F0BA-4627-A9A9-F35141387244"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
|
||||
"versionStartExcluding": "5.18",
|
||||
"versionEndExcluding": "5.18.3",
|
||||
"matchCriteriaId": "AE4422AF-02DF-4A4E-8EE6-6437A19A5D93"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F62EECE-8FB1-4D57-85D8-CB9E23CF313C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F76C298-81DC-43E4-8FC9-DC005A2116EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0AB349B2-3F78-4197-882B-90ADB3BF645A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "476CB3A5-D022-4F13-AAEF-CB6A5785516A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8CFD5CDD-1709-44C7-82BD-BAFDC46990D6"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -115,6 +196,36 @@
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
|
||||
"matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
|
||||
"matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-22035",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.150",
|
||||
"lastModified": "2022-10-13T14:40:57.287",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:09.387",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081."
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-24504",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.237",
|
||||
"lastModified": "2022-10-13T14:41:00.257",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:09.523",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081."
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-26929",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-09-13T19:15:09.473",
|
||||
"lastModified": "2023-10-15T16:18:45.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:09.623",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ".NET Framework Remote Code Execution Vulnerability."
|
||||
"value": ".NET Framework Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-30198",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.307",
|
||||
"lastModified": "2022-10-13T14:41:02.173",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:09.790",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081."
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33634",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.393",
|
||||
"lastModified": "2022-10-13T14:41:04.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:09.907",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081."
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33635",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.493",
|
||||
"lastModified": "2022-10-12T14:36:28.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:10.007",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows GDI+ Remote Code Execution Vulnerability."
|
||||
"value": "Windows GDI+ Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33645",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.570",
|
||||
"lastModified": "2022-10-12T14:42:44.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:10.133",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows TCP/IP Driver Denial of Service Vulnerability."
|
||||
"value": "Windows TCP/IP Driver Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34689",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.637",
|
||||
"lastModified": "2022-10-12T14:44:24.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:10.270",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows CryptoAPI Spoofing Vulnerability."
|
||||
"value": "Windows CryptoAPI Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35770",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.713",
|
||||
"lastModified": "2022-10-12T14:46:20.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:10.603",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows NTLM Spoofing Vulnerability."
|
||||
"value": "Windows NTLM Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35828",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-09-13T19:15:11.137",
|
||||
"lastModified": "2022-09-16T15:25:37.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:10.723",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability."
|
||||
"value": "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35829",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.787",
|
||||
"lastModified": "2022-10-14T14:50:53.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:10.850",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Service Fabric Explorer Spoofing Vulnerability."
|
||||
"value": "Service Fabric Explorer Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37965",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:11.960",
|
||||
"lastModified": "2022-10-12T15:02:17.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:11.213",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability."
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37968",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.030",
|
||||
"lastModified": "2022-10-12T15:06:38.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:11.297",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability."
|
||||
"value": "<p>Microsoft has identified a vulnerability affecting the cluster connect feature of Azure Arc-enabled Kubernetes clusters. This vulnerability could allow an unauthenticated user to elevate their privileges and potentially gain administrative control over the Kubernetes cluster. Additionally, because Azure Stack Edge allows customers to deploy Kubernetes workloads on their devices via Azure Arc, Azure Stack Edge devices are also vulnerable to this vulnerability.</p>\n"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37970",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.100",
|
||||
"lastModified": "2022-10-12T15:12:15.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:11.397",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability."
|
||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37971",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.167",
|
||||
"lastModified": "2023-09-18T07:15:37.223",
|
||||
"lastModified": "2023-12-20T20:15:11.473",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Windows Defender Elevation of Privilege Vulnerability."
|
||||
"value": "Microsoft Windows Defender Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37972",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-09-20T19:15:09.930",
|
||||
"lastModified": "2022-12-22T20:28:16.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:11.557",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Endpoint Configuration Manager Spoofing Vulnerability."
|
||||
"value": "Microsoft Endpoint Configuration Manager Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37973",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.230",
|
||||
"lastModified": "2022-11-14T15:09:31.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:11.650",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37998."
|
||||
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37974",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.297",
|
||||
"lastModified": "2022-10-12T19:19:44.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:11.737",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Mixed Reality Developer Tools Information Disclosure Vulnerability."
|
||||
"value": "Windows Mixed Reality Developer Tools Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37975",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.370",
|
||||
"lastModified": "2022-11-14T14:46:02.730",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:11.813",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Group Policy Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Group Policy Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -65,7 +65,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37976",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.457",
|
||||
"lastModified": "2022-10-12T18:29:17.497",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:11.897",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Active Directory Certificate Services Elevation of Privilege Vulnerability."
|
||||
"value": "Active Directory Certificate Services Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37977",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.530",
|
||||
"lastModified": "2022-10-13T14:48:20.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:11.983",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability."
|
||||
"value": "Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37978",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.597",
|
||||
"lastModified": "2022-10-13T14:56:54.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.073",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Active Directory Certificate Services Security Feature Bypass."
|
||||
"value": "Windows Active Directory Certificate Services Security Feature Bypass"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37979",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.667",
|
||||
"lastModified": "2022-10-13T13:42:00.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.180",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hyper-V Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Hyper-V Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37980",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.833",
|
||||
"lastModified": "2022-10-13T13:54:51.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.287",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows DHCP Client Elevation of Privilege Vulnerability."
|
||||
"value": "Windows DHCP Client Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37981",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:12.937",
|
||||
"lastModified": "2022-10-13T14:16:39.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.367",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Event Logging Service Denial of Service Vulnerability."
|
||||
"value": "Windows Event Logging Service Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37982",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.000",
|
||||
"lastModified": "2022-10-13T14:22:13.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.467",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38031."
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37983",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.077",
|
||||
"lastModified": "2022-10-12T17:32:24.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.567",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft DWM Core Library Elevation of Privilege Vulnerability."
|
||||
"value": "Microsoft DWM Core Library Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37984",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.147",
|
||||
"lastModified": "2022-10-12T17:34:46.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.647",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows WLAN Service Elevation of Privilege Vulnerability."
|
||||
"value": "Windows WLAN Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37985",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.220",
|
||||
"lastModified": "2022-10-12T17:37:15.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.740",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Graphics Component Information Disclosure Vulnerability."
|
||||
"value": "Windows Graphics Component Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37986",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.297",
|
||||
"lastModified": "2022-10-12T17:44:26.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.830",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Win32k Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Win32k Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37987",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.367",
|
||||
"lastModified": "2022-10-12T14:56:35.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:12.937",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37989."
|
||||
"value": "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37988",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.437",
|
||||
"lastModified": "2022-12-09T19:39:58.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.037",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37989",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.503",
|
||||
"lastModified": "2022-10-12T15:14:07.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.140",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37987."
|
||||
"value": "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37990",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.567",
|
||||
"lastModified": "2022-10-12T14:27:41.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.237",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37991",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.640",
|
||||
"lastModified": "2023-01-19T03:25:20.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.323",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37993",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.707",
|
||||
"lastModified": "2022-10-12T14:47:00.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.420",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37994, CVE-2022-37999."
|
||||
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37994",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.783",
|
||||
"lastModified": "2022-10-12T14:04:27.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.510",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37993, CVE-2022-37999."
|
||||
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37995",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.877",
|
||||
"lastModified": "2022-10-12T14:04:40.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.600",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37996",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:13.960",
|
||||
"lastModified": "2022-10-12T14:09:26.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.690",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Memory Information Disclosure Vulnerability."
|
||||
"value": "Windows Kernel Memory Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37997",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.030",
|
||||
"lastModified": "2022-10-13T14:23:52.817",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.777",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-38051."
|
||||
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37998",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.107",
|
||||
"lastModified": "2022-10-13T13:19:29.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.867",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37973."
|
||||
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-37999",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.180",
|
||||
"lastModified": "2022-10-13T13:19:45.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:13.957",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37993, CVE-2022-37994."
|
||||
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38000",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.253",
|
||||
"lastModified": "2022-10-13T13:06:42.097",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:14.043",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38047, CVE-2022-41081."
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38001",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.320",
|
||||
"lastModified": "2022-10-12T17:28:09.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:14.137",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Office Spoofing Vulnerability."
|
||||
"value": "Microsoft Office Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38003",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.403",
|
||||
"lastModified": "2022-10-12T17:29:17.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:14.233",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Resilient File System Elevation of Privilege."
|
||||
"value": "Windows Resilient File System Elevation of Privilege"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38007",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-09-13T19:15:12.543",
|
||||
"lastModified": "2022-09-16T17:55:24.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:14.357",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability."
|
||||
"value": "Azure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -45,7 +45,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38011",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-09-13T19:15:12.757",
|
||||
"lastModified": "2022-09-16T18:57:45.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:14.483",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Raw Image Extension Remote Code Execution Vulnerability."
|
||||
"value": "Raw Image Extension Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38013",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-09-13T19:15:12.867",
|
||||
"lastModified": "2023-11-07T03:49:58.943",
|
||||
"lastModified": "2023-12-20T20:15:14.580",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ".NET Core and Visual Studio Denial of Service Vulnerability."
|
||||
"value": ".NET Core and Visual Studio Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38016",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.477",
|
||||
"lastModified": "2022-10-12T17:30:45.567",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:14.667",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38017",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.567",
|
||||
"lastModified": "2022-10-12T17:10:05.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:14.750",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "StorSimple 8000 Series Elevation of Privilege Vulnerability."
|
||||
"value": "StorSimple 8000 Series Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38019",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-09-13T19:15:12.920",
|
||||
"lastModified": "2022-09-16T18:35:55.993",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:14.827",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "AV1 Video Extension Remote Code Execution Vulnerability."
|
||||
"value": "AV1 Video Extension Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38021",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.667",
|
||||
"lastModified": "2022-10-12T17:09:40.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:14.917",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Connected User Experiences and Telemetry Elevation of Privilege Vulnerability."
|
||||
"value": "Connected User Experiences and Telemetry Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38022",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.773",
|
||||
"lastModified": "2022-11-14T14:47:16.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.007",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38025",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.850",
|
||||
"lastModified": "2022-10-12T17:06:36.953",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.140",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Distributed File System (DFS) Information Disclosure Vulnerability."
|
||||
"value": "Windows Distributed File System (DFS) Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38026",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.917",
|
||||
"lastModified": "2022-10-12T16:52:55.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.233",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows DHCP Client Information Disclosure Vulnerability."
|
||||
"value": "Windows DHCP Client Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38027",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:14.993",
|
||||
"lastModified": "2022-10-12T16:52:33.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.317",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Storage Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Storage Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38028",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:15.067",
|
||||
"lastModified": "2022-10-12T17:11:15.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.410",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Print Spooler Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38029",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:15.133",
|
||||
"lastModified": "2022-10-12T17:17:22.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.500",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows ALPC Elevation of Privilege Vulnerability."
|
||||
"value": "Windows ALPC Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38030",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:15.217",
|
||||
"lastModified": "2022-10-12T17:19:05.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.607",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows USB Serial Driver Information Disclosure Vulnerability."
|
||||
"value": "Windows USB Serial Driver Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38031",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:15.287",
|
||||
"lastModified": "2022-10-12T17:11:54.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.713",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-37982."
|
||||
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38032",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:15.353",
|
||||
"lastModified": "2022-12-15T17:28:56.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.800",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability."
|
||||
"value": "Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38033",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:15.440",
|
||||
"lastModified": "2022-10-12T17:21:01.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:15.900",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability."
|
||||
"value": "Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38034",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:15.833",
|
||||
"lastModified": "2022-11-14T14:53:35.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.043",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Workstation Service Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Workstation Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38036",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:16.183",
|
||||
"lastModified": "2022-10-12T17:16:59.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.173",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability."
|
||||
"value": "Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38037",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:16.373",
|
||||
"lastModified": "2022-11-09T04:02:35.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.263",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38038, CVE-2022-38039."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38038",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:16.680",
|
||||
"lastModified": "2023-01-19T03:26:53.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.353",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38039."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38039",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:16.967",
|
||||
"lastModified": "2022-10-12T17:12:14.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.443",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38040",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:17.357",
|
||||
"lastModified": "2022-10-12T17:16:21.897",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.523",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38041",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:17.647",
|
||||
"lastModified": "2022-10-12T19:39:46.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.610",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Channel Denial of Service Vulnerability."
|
||||
"value": "Windows Secure Channel Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38042",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:18.063",
|
||||
"lastModified": "2022-12-15T17:28:24.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.700",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability."
|
||||
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38043",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:18.500",
|
||||
"lastModified": "2022-11-14T15:24:54.080",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.793",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Security Support Provider Interface Information Disclosure Vulnerability."
|
||||
"value": "Windows Security Support Provider Interface Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38044",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:18.817",
|
||||
"lastModified": "2022-10-12T19:50:35.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.883",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows CD-ROM File System Driver Remote Code Execution Vulnerability."
|
||||
"value": "Windows CD-ROM File System Driver Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38045",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:19.150",
|
||||
"lastModified": "2022-12-05T20:23:07.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:16.983",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Server Service Remote Protocol Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Server Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38046",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:19.410",
|
||||
"lastModified": "2023-02-10T16:17:41.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.083",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Web Account Manager Information Disclosure Vulnerability."
|
||||
"value": "Web Account Manager Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38047",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:19.480",
|
||||
"lastModified": "2022-10-13T15:55:15.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.170",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-41081."
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38048",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:19.550",
|
||||
"lastModified": "2022-10-12T19:04:27.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.260",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Office Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Office Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38049",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:19.680",
|
||||
"lastModified": "2022-10-13T15:51:54.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.367",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38050",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:19.837",
|
||||
"lastModified": "2022-10-13T15:51:11.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.453",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Win32k Elevation of Privilege Vulnerability."
|
||||
"value": "Win32k Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38051",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.080",
|
||||
"lastModified": "2022-10-13T15:50:53.617",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.527",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37997."
|
||||
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-38053",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.240",
|
||||
"lastModified": "2022-10-13T15:43:39.813",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.617",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41036, CVE-2022-41037, CVE-2022-41038."
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41031",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.383",
|
||||
"lastModified": "2022-10-13T15:37:10.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.710",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Word Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Word Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41032",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.483",
|
||||
"lastModified": "2023-12-13T16:14:01.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.783",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NuGet Client Elevation of Privilege Vulnerability."
|
||||
"value": "NuGet Client Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-41033",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.567",
|
||||
"lastModified": "2022-10-13T15:26:28.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.880",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2022-10-11",
|
||||
"cisaActionDue": "2022-11-01",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -11,7 +11,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows COM+ Event System Service Elevation of Privilege Vulnerability."
|
||||
"value": "Windows COM+ Event System Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -49,7 +49,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-843"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41034",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.643",
|
||||
"lastModified": "2022-10-13T15:20:38.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:17.973",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Visual Studio Code Remote Code Execution Vulnerability."
|
||||
"value": "Visual Studio Code Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41035",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.710",
|
||||
"lastModified": "2022-11-14T14:41:38.017",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:18.063",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability."
|
||||
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41036",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.773",
|
||||
"lastModified": "2022-10-12T16:51:49.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:18.157",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38053, CVE-2022-41037, CVE-2022-41038."
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41037",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.833",
|
||||
"lastModified": "2022-10-12T16:51:16.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:18.240",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38053, CVE-2022-41036, CVE-2022-41038."
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41038",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.907",
|
||||
"lastModified": "2022-10-12T16:50:09.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:18.320",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38053, CVE-2022-41036, CVE-2022-41037."
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41040",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-03T01:15:08.753",
|
||||
"lastModified": "2023-03-02T22:15:08.877",
|
||||
"lastModified": "2023-12-20T20:15:18.393",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2022-09-30",
|
||||
"cisaActionDue": "2022-10-21",
|
||||
@ -11,7 +11,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Exchange Server Elevation of Privilege Vulnerability."
|
||||
"value": "Microsoft Exchange Server Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -49,7 +49,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41042",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:20.980",
|
||||
"lastModified": "2022-10-12T17:15:39.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:18.497",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Visual Studio Code Information Disclosure Vulnerability."
|
||||
"value": "Visual Studio Code Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41043",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:21.057",
|
||||
"lastModified": "2022-12-05T20:23:14.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:18.577",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Office Information Disclosure Vulnerability."
|
||||
"value": "Microsoft Office Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41081",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:21.143",
|
||||
"lastModified": "2022-10-12T17:14:48.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:18.650",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047."
|
||||
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41082",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-03T01:15:08.843",
|
||||
"lastModified": "2023-03-02T22:15:09.123",
|
||||
"lastModified": "2023-12-20T20:15:18.737",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2022-09-30",
|
||||
"cisaActionDue": "2022-10-21",
|
||||
@ -11,7 +11,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -25,8 +25,8 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
@ -34,10 +34,10 @@
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
@ -49,7 +49,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-41083",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-10-11T19:15:21.217",
|
||||
"lastModified": "2022-10-12T17:14:26.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-20T20:15:18.927",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Visual Studio Code Elevation of Privilege Vulnerability."
|
||||
"value": "Visual Studio Code Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
43
CVE-2022/CVE-2022-446xx/CVE-2022-44684.json
Normal file
43
CVE-2022/CVE-2022-446xx/CVE-2022-44684.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-44684",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-12-20T20:15:19.003",
|
||||
"lastModified": "2023-12-20T20:15:19.003",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44684",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-4603",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2022-12-18T11:15:11.077",
|
||||
"lastModified": "2023-11-07T03:58:19.557",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-12-20T19:14:03.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -17,23 +17,23 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -56,7 +56,7 @@
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
@ -64,6 +64,16 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47085",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-07-18T14:15:12.263",
|
||||
"lastModified": "2023-07-27T15:08:02.717",
|
||||
"lastModified": "2023-12-20T19:13:40.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,20 +17,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47597",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-12-20T18:15:11.143",
|
||||
"lastModified": "2023-12-20T18:15:11.143",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-20T19:52:41.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-47599",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-12-20T18:15:11.417",
|
||||
"lastModified": "2023-12-20T18:15:11.417",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2023-12-20T19:52:41.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user