Auto-Update: 2023-12-20T21:00:24.583487+00:00

This commit is contained in:
cad-safe-bot 2023-12-20 21:00:28 +00:00
parent 46f64c09a4
commit 9578a75dc1
171 changed files with 2958 additions and 567 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-1184",
"sourceIdentifier": "secalert@redhat.com",
"published": "2022-08-29T15:15:10.413",
"lastModified": "2023-02-12T22:15:23.433",
"vulnStatus": "Modified",
"lastModified": "2023-12-20T20:10:36.557",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -69,8 +69,89 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "2.6.12",
"versionEndExcluding": "4.9.138",
"matchCriteriaId": "F9C64950-F22D-4306-B3A7-EAE45176299B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "4.14",
"versionEndExcluding": "4.14.283",
"matchCriteriaId": "710B94A9-F09F-4B18-9D38-0FDBC004BB21"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "4.19",
"versionEndExcluding": "4.19.247",
"matchCriteriaId": "94240ABF-996C-4B73-8612-9B1102881F8A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "5.4",
"versionEndExcluding": "5.4.198",
"matchCriteriaId": "226DC59F-A75D-47CE-BAB5-DFA20C8E4A46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "5.10",
"versionEndExcluding": "5.10.121",
"matchCriteriaId": "EDEF9A49-C2F9-41C6-9947-52E8D13E4E53"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "5.15",
"versionEndExcluding": "5.15.46",
"matchCriteriaId": "77578AA5-6692-47CA-BC03-E99D59007463"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "5.17",
"versionEndExcluding": "5.17.14",
"matchCriteriaId": "597F5F18-F0BA-4627-A9A9-F35141387244"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartExcluding": "5.18",
"versionEndExcluding": "5.18.3",
"matchCriteriaId": "AE4422AF-02DF-4A4E-8EE6-6437A19A5D93"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:-:*:*:*:*:*:*",
"matchCriteriaId": "6F62EECE-8FB1-4D57-85D8-CB9E23CF313C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4F76C298-81DC-43E4-8FC9-DC005A2116EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0AB349B2-3F78-4197-882B-90ADB3BF645A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"matchCriteriaId": "476CB3A5-D022-4F13-AAEF-CB6A5785516A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8CFD5CDD-1709-44C7-82BD-BAFDC46990D6"
}
]
}
@ -115,6 +196,36 @@
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "7A5301BF-1402-4BE0-A0F8-69FBE79BC6D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "B3293E55-5506-4587-A318-D1734F781C09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*",
"matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB"
}
]
}
]
}
],
"references": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-22035",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.150",
"lastModified": "2022-10-13T14:40:57.287",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:09.387",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081."
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-24504",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.237",
"lastModified": "2022-10-13T14:41:00.257",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:09.523",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081."
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-26929",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-09-13T19:15:09.473",
"lastModified": "2023-10-15T16:18:45.880",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:09.623",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": ".NET Framework Remote Code Execution Vulnerability."
"value": ".NET Framework Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-30198",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.307",
"lastModified": "2022-10-13T14:41:02.173",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:09.790",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081."
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33634",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.393",
"lastModified": "2022-10-13T14:41:04.043",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:09.907",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-38000, CVE-2022-38047, CVE-2022-41081."
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33635",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.493",
"lastModified": "2022-10-12T14:36:28.757",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:10.007",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows GDI+ Remote Code Execution Vulnerability."
"value": "Windows GDI+ Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33645",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.570",
"lastModified": "2022-10-12T14:42:44.197",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:10.133",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows TCP/IP Driver Denial of Service Vulnerability."
"value": "Windows TCP/IP Driver Denial of Service Vulnerability"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34689",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.637",
"lastModified": "2022-10-12T14:44:24.913",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:10.270",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows CryptoAPI Spoofing Vulnerability."
"value": "Windows CryptoAPI Spoofing Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35770",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.713",
"lastModified": "2022-10-12T14:46:20.650",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:10.603",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows NTLM Spoofing Vulnerability."
"value": "Windows NTLM Spoofing Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35828",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-09-13T19:15:11.137",
"lastModified": "2022-09-16T15:25:37.957",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:10.723",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability."
"value": "Microsoft Defender for Endpoint for Mac Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35829",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.787",
"lastModified": "2022-10-14T14:50:53.213",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:10.850",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Service Fabric Explorer Spoofing Vulnerability."
"value": "Service Fabric Explorer Spoofing Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37965",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:11.960",
"lastModified": "2022-10-12T15:02:17.877",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:11.213",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability."
"value": "Windows Point-to-Point Tunneling Protocol Denial of Service Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37968",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.030",
"lastModified": "2022-10-12T15:06:38.720",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:11.297",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Arc-enabled Kubernetes cluster Connect Elevation of Privilege Vulnerability."
"value": "<p>Microsoft has identified a vulnerability affecting the cluster connect feature of Azure Arc-enabled Kubernetes clusters. This vulnerability could allow an unauthenticated user to elevate their privileges and potentially gain administrative control over the Kubernetes cluster. Additionally, because Azure Stack Edge allows customers to deploy Kubernetes workloads on their devices via Azure Arc, Azure Stack Edge devices are also vulnerable to this vulnerability.</p>\n"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37970",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.100",
"lastModified": "2022-10-12T15:12:15.590",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:11.397",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability."
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37971",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.167",
"lastModified": "2023-09-18T07:15:37.223",
"lastModified": "2023-12-20T20:15:11.473",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Windows Defender Elevation of Privilege Vulnerability."
"value": "Microsoft Windows Defender Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37972",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-09-20T19:15:09.930",
"lastModified": "2022-12-22T20:28:16.880",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:11.557",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Endpoint Configuration Manager Spoofing Vulnerability."
"value": "Microsoft Endpoint Configuration Manager Spoofing Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37973",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.230",
"lastModified": "2022-11-14T15:09:31.297",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:11.650",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37998."
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability"
},
{
"lang": "es",
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37974",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.297",
"lastModified": "2022-10-12T19:19:44.623",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:11.737",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Mixed Reality Developer Tools Information Disclosure Vulnerability."
"value": "Windows Mixed Reality Developer Tools Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37975",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.370",
"lastModified": "2022-11-14T14:46:02.730",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:11.813",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Group Policy Elevation of Privilege Vulnerability."
"value": "Windows Group Policy Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -65,7 +65,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37976",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.457",
"lastModified": "2022-10-12T18:29:17.497",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:11.897",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Active Directory Certificate Services Elevation of Privilege Vulnerability."
"value": "Active Directory Certificate Services Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37977",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.530",
"lastModified": "2022-10-13T14:48:20.417",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:11.983",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability."
"value": "Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37978",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.597",
"lastModified": "2022-10-13T14:56:54.717",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.073",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Active Directory Certificate Services Security Feature Bypass."
"value": "Windows Active Directory Certificate Services Security Feature Bypass"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37979",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.667",
"lastModified": "2022-10-13T13:42:00.067",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.180",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Elevation of Privilege Vulnerability."
"value": "Windows Hyper-V Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37980",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.833",
"lastModified": "2022-10-13T13:54:51.317",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.287",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows DHCP Client Elevation of Privilege Vulnerability."
"value": "Windows DHCP Client Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37981",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:12.937",
"lastModified": "2022-10-13T14:16:39.310",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.367",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Event Logging Service Denial of Service Vulnerability."
"value": "Windows Event Logging Service Denial of Service Vulnerability"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37982",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.000",
"lastModified": "2022-10-13T14:22:13.400",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.467",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38031."
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37983",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.077",
"lastModified": "2022-10-12T17:32:24.580",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.567",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft DWM Core Library Elevation of Privilege Vulnerability."
"value": "Microsoft DWM Core Library Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37984",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.147",
"lastModified": "2022-10-12T17:34:46.953",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.647",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows WLAN Service Elevation of Privilege Vulnerability."
"value": "Windows WLAN Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37985",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.220",
"lastModified": "2022-10-12T17:37:15.637",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.740",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Graphics Component Information Disclosure Vulnerability."
"value": "Windows Graphics Component Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37986",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.297",
"lastModified": "2022-10-12T17:44:26.940",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.830",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Win32k Elevation of Privilege Vulnerability."
"value": "Windows Win32k Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37987",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.367",
"lastModified": "2022-10-12T14:56:35.910",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:12.937",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37989."
"value": "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37988",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.437",
"lastModified": "2022-12-09T19:39:58.637",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.037",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37989",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.503",
"lastModified": "2022-10-12T15:14:07.783",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37987."
"value": "Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37990",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.567",
"lastModified": "2022-10-12T14:27:41.163",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.237",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37991",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.640",
"lastModified": "2023-01-19T03:25:20.717",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.323",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37993",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.707",
"lastModified": "2022-10-12T14:47:00.243",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.420",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37994, CVE-2022-37999."
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37994",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.783",
"lastModified": "2022-10-12T14:04:27.960",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.510",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37993, CVE-2022-37999."
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37995",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.877",
"lastModified": "2022-10-12T14:04:40.557",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.600",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37996",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:13.960",
"lastModified": "2022-10-12T14:09:26.840",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.690",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Memory Information Disclosure Vulnerability."
"value": "Windows Kernel Memory Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37997",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.030",
"lastModified": "2022-10-13T14:23:52.817",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.777",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-38051."
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37998",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.107",
"lastModified": "2022-10-13T13:19:29.233",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.867",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-37973."
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-37999",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.180",
"lastModified": "2022-10-13T13:19:45.447",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:13.957",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37993, CVE-2022-37994."
"value": "Windows Group Policy Preference Client Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38000",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.253",
"lastModified": "2022-10-13T13:06:42.097",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:14.043",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38047, CVE-2022-41081."
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38001",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.320",
"lastModified": "2022-10-12T17:28:09.410",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:14.137",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Office Spoofing Vulnerability."
"value": "Microsoft Office Spoofing Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38003",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.403",
"lastModified": "2022-10-12T17:29:17.087",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:14.233",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Resilient File System Elevation of Privilege."
"value": "Windows Resilient File System Elevation of Privilege"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38007",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-09-13T19:15:12.543",
"lastModified": "2022-09-16T17:55:24.993",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:14.357",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability."
"value": "Azure Guest Configuration and Azure Arc-enabled servers Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -45,7 +45,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38011",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-09-13T19:15:12.757",
"lastModified": "2022-09-16T18:57:45.337",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:14.483",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Raw Image Extension Remote Code Execution Vulnerability."
"value": "Raw Image Extension Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38013",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-09-13T19:15:12.867",
"lastModified": "2023-11-07T03:49:58.943",
"lastModified": "2023-12-20T20:15:14.580",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": ".NET Core and Visual Studio Denial of Service Vulnerability."
"value": ".NET Core and Visual Studio Denial of Service Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "f38d906d-7342-40ea-92c1-6c4a2c6478c8",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38016",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.477",
"lastModified": "2022-10-12T17:30:45.567",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:14.667",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability."
"value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38017",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.567",
"lastModified": "2022-10-12T17:10:05.630",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:14.750",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "StorSimple 8000 Series Elevation of Privilege Vulnerability."
"value": "StorSimple 8000 Series Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38019",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-09-13T19:15:12.920",
"lastModified": "2022-09-16T18:35:55.993",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:14.827",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "AV1 Video Extension Remote Code Execution Vulnerability."
"value": "AV1 Video Extension Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38021",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.667",
"lastModified": "2022-10-12T17:09:40.197",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:14.917",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Connected User Experiences and Telemetry Elevation of Privilege Vulnerability."
"value": "Connected User Experiences and Telemetry Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38022",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.773",
"lastModified": "2022-11-14T14:47:16.837",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.007",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38037, CVE-2022-38038, CVE-2022-38039."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38025",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.850",
"lastModified": "2022-10-12T17:06:36.953",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Distributed File System (DFS) Information Disclosure Vulnerability."
"value": "Windows Distributed File System (DFS) Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38026",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.917",
"lastModified": "2022-10-12T16:52:55.033",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.233",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows DHCP Client Information Disclosure Vulnerability."
"value": "Windows DHCP Client Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38027",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:14.993",
"lastModified": "2022-10-12T16:52:33.060",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.317",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Storage Elevation of Privilege Vulnerability."
"value": "Windows Storage Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38028",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:15.067",
"lastModified": "2022-10-12T17:11:15.017",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.410",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Print Spooler Elevation of Privilege Vulnerability."
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38029",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:15.133",
"lastModified": "2022-10-12T17:17:22.610",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.500",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows ALPC Elevation of Privilege Vulnerability."
"value": "Windows ALPC Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38030",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:15.217",
"lastModified": "2022-10-12T17:19:05.140",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.607",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows USB Serial Driver Information Disclosure Vulnerability."
"value": "Windows USB Serial Driver Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38031",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:15.287",
"lastModified": "2022-10-12T17:11:54.140",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.713",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-37982."
"value": "Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38032",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:15.353",
"lastModified": "2022-12-15T17:28:56.550",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.800",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability."
"value": "Windows Portable Device Enumerator Service Security Feature Bypass Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38033",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:15.440",
"lastModified": "2022-10-12T17:21:01.127",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:15.900",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability."
"value": "Windows Server Remotely Accessible Registry Keys Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38034",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:15.833",
"lastModified": "2022-11-14T14:53:35.010",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.043",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Workstation Service Elevation of Privilege Vulnerability."
"value": "Windows Workstation Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38036",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:16.183",
"lastModified": "2022-10-12T17:16:59.590",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.173",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability."
"value": "Internet Key Exchange (IKE) Protocol Denial of Service Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38037",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:16.373",
"lastModified": "2022-11-09T04:02:35.647",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.263",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38038, CVE-2022-38039."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38038",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:16.680",
"lastModified": "2023-01-19T03:26:53.877",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.353",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38039."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38039",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:16.967",
"lastModified": "2022-10-12T17:12:14.317",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.443",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37988, CVE-2022-37990, CVE-2022-37991, CVE-2022-37995, CVE-2022-38022, CVE-2022-38037, CVE-2022-38038."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38040",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:17.357",
"lastModified": "2022-10-12T17:16:21.897",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.523",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability."
"value": "Microsoft ODBC Driver Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38041",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:17.647",
"lastModified": "2022-10-12T19:39:46.337",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.610",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Channel Denial of Service Vulnerability."
"value": "Windows Secure Channel Denial of Service Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38042",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:18.063",
"lastModified": "2022-12-15T17:28:24.107",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.700",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability."
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38043",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:18.500",
"lastModified": "2022-11-14T15:24:54.080",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.793",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Security Support Provider Interface Information Disclosure Vulnerability."
"value": "Windows Security Support Provider Interface Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38044",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:18.817",
"lastModified": "2022-10-12T19:50:35.520",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.883",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows CD-ROM File System Driver Remote Code Execution Vulnerability."
"value": "Windows CD-ROM File System Driver Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38045",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:19.150",
"lastModified": "2022-12-05T20:23:07.350",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:16.983",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Server Service Remote Protocol Elevation of Privilege Vulnerability."
"value": "Windows Server Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38046",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:19.410",
"lastModified": "2023-02-10T16:17:41.547",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.083",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Web Account Manager Information Disclosure Vulnerability."
"value": "Web Account Manager Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38047",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:19.480",
"lastModified": "2022-10-13T15:55:15.180",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.170",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-41081."
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38048",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:19.550",
"lastModified": "2022-10-12T19:04:27.943",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.260",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Office Remote Code Execution Vulnerability."
"value": "Microsoft Office Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38049",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:19.680",
"lastModified": "2022-10-13T15:51:54.213",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.367",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability."
"value": "Microsoft Office Graphics Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38050",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:19.837",
"lastModified": "2022-10-13T15:51:11.863",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.453",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Win32k Elevation of Privilege Vulnerability."
"value": "Win32k Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38051",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.080",
"lastModified": "2022-10-13T15:50:53.617",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.527",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Graphics Component Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-37997."
"value": "Windows Graphics Component Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-38053",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.240",
"lastModified": "2022-10-13T15:43:39.813",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.617",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-41036, CVE-2022-41037, CVE-2022-41038."
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41031",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.383",
"lastModified": "2022-10-13T15:37:10.443",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.710",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Word Remote Code Execution Vulnerability."
"value": "Microsoft Word Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41032",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.483",
"lastModified": "2023-12-13T16:14:01.337",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.783",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "NuGet Client Elevation of Privilege Vulnerability."
"value": "NuGet Client Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-41033",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.567",
"lastModified": "2022-10-13T15:26:28.407",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.880",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-10-11",
"cisaActionDue": "2022-11-01",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
"value": "Windows COM+ Event System Service Elevation of Privilege Vulnerability."
"value": "Windows COM+ Event System Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -49,7 +49,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-843"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41034",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.643",
"lastModified": "2022-10-13T15:20:38.977",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:17.973",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Visual Studio Code Remote Code Execution Vulnerability."
"value": "Visual Studio Code Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41035",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.710",
"lastModified": "2022-11-14T14:41:38.017",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:18.063",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability."
"value": "Microsoft Edge (Chromium-based) Spoofing Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41036",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.773",
"lastModified": "2022-10-12T16:51:49.517",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:18.157",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38053, CVE-2022-41037, CVE-2022-41038."
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41037",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.833",
"lastModified": "2022-10-12T16:51:16.387",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:18.240",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38053, CVE-2022-41036, CVE-2022-41038."
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41038",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.907",
"lastModified": "2022-10-12T16:50:09.603",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:18.320",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-38053, CVE-2022-41036, CVE-2022-41037."
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41040",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-03T01:15:08.753",
"lastModified": "2023-03-02T22:15:08.877",
"lastModified": "2023-12-20T20:15:18.393",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-09-30",
"cisaActionDue": "2022-10-21",
@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Elevation of Privilege Vulnerability."
"value": "Microsoft Exchange Server Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -49,7 +49,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-918"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41042",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:20.980",
"lastModified": "2022-10-12T17:15:39.277",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:18.497",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Visual Studio Code Information Disclosure Vulnerability."
"value": "Visual Studio Code Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41043",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:21.057",
"lastModified": "2022-12-05T20:23:14.073",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:18.577",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Office Information Disclosure Vulnerability."
"value": "Microsoft Office Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41081",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:21.143",
"lastModified": "2022-10-12T17:14:48.477",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:18.650",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-22035, CVE-2022-24504, CVE-2022-30198, CVE-2022-33634, CVE-2022-38000, CVE-2022-38047."
"value": "Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-41082",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-03T01:15:08.843",
"lastModified": "2023-03-02T22:15:09.123",
"lastModified": "2023-12-20T20:15:18.737",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-09-30",
"cisaActionDue": "2022-10-21",
@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability."
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -25,8 +25,8 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
@ -34,10 +34,10 @@
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
@ -49,7 +49,7 @@
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
"value": "CWE-502"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-41083",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-10-11T19:15:21.217",
"lastModified": "2022-10-12T17:14:26.443",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-20T20:15:18.927",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Visual Studio Code Elevation of Privilege Vulnerability."
"value": "Visual Studio Code Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-44684",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-12-20T20:15:19.003",
"lastModified": "2023-12-20T20:15:19.003",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Local Session Manager (LSM) Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44684",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-4603",
"sourceIdentifier": "cna@vuldb.com",
"published": "2022-12-18T11:15:11.077",
"lastModified": "2023-11-07T03:58:19.557",
"vulnStatus": "Modified",
"lastModified": "2023-12-20T19:14:03.717",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -17,23 +17,23 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
"impactScore": 3.6
},
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -56,7 +56,7 @@
},
"weaknesses": [
{
"source": "1af790b2-7ee1-4545-860a-a788eba489b5",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
@ -64,6 +64,16 @@
"value": "CWE-119"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47085",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-07-18T14:15:12.263",
"lastModified": "2023-07-27T15:08:02.717",
"lastModified": "2023-12-20T19:13:40.243",
"vulnStatus": "Analyzed",
"descriptions": [
{
@ -17,20 +17,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
"impactScore": 3.6
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47597",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-20T18:15:11.143",
"lastModified": "2023-12-20T18:15:11.143",
"vulnStatus": "Received",
"lastModified": "2023-12-20T19:52:41.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-47599",
"sourceIdentifier": "audit@patchstack.com",
"published": "2023-12-20T18:15:11.417",
"lastModified": "2023-12-20T18:15:11.417",
"vulnStatus": "Received",
"lastModified": "2023-12-20T19:52:41.030",
"vulnStatus": "Awaiting Analysis",
"descriptions": [
{
"lang": "en",

Some files were not shown because too many files have changed in this diff Show More