Auto-Update: 2023-12-21T03:00:24.953207+00:00

This commit is contained in:
cad-safe-bot 2023-12-21 03:00:28 +00:00
parent f28f07566d
commit afd242a537
184 changed files with 1577 additions and 645 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2015-4852",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2015-11-18T15:59:00.133",
"lastModified": "2019-03-28T19:29:00.277",
"vulnStatus": "Modified",
"lastModified": "2023-12-21T01:31:11.820",
"vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Oracle WebLogic Server Remote Code Execution Vulnerability",
"cisaVulnerabilityName": "Oracle WebLogic Server Deserialization of Untrusted Data Vulnerability",
"descriptions": [
{
"lang": "en",
@ -19,6 +19,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
@ -52,7 +74,7 @@
"description": [
{
"lang": "en",
"value": "CWE-77"
"value": "CWE-502"
}
]
}
@ -80,6 +102,11 @@
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E55B3AA9-69BE-4136-8C3A-FD0DDCD3FA4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
@ -110,39 +137,56 @@
"url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/",
"source": "secalert_us@oracle.com",
"tags": [
"Exploit",
"Technical Description"
"Exploit"
]
},
{
"url": "http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2015/11/17/19",
"source": "secalert_us@oracle.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Patch"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2015-4852-2763333.html",
@ -161,33 +205,49 @@
},
{
"url": "http://www.securityfocus.com/bid/77539",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
]
},
{
"url": "http://www.securitytracker.com/id/1038292",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://blogs.oracle.com/security/entry/security_alert_cve_2015_4852",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
"Broken Link"
]
},
{
"url": "https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py",
"source": "secalert_us@oracle.com",
"tags": [
"Exploit"
"Product"
]
},
{
"url": "https://www.exploit-db.com/exploits/42806/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.exploit-db.com/exploits/46628/",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-2241",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:12.783",
"lastModified": "2023-10-25T18:16:38.553",
"vulnStatus": "Modified",
"lastModified": "2023-12-21T01:43:39.437",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-2281",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-23T14:15:13.210",
"lastModified": "2023-10-25T18:16:40.967",
"vulnStatus": "Modified",
"lastModified": "2023-12-21T01:40:58.930",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -98,6 +98,7 @@
"url": "http://www.openwall.com/lists/oss-security/2020/09/23/1",
"source": "jenkinsci-cert@googlegroups.com",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21665",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-10T15:15:08.977",
"lastModified": "2023-10-25T18:16:50.660",
"vulnStatus": "Modified",
"lastModified": "2023-12-21T01:47:29.513",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -21,19 +21,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
@ -63,6 +63,18 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21833",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.090",
"lastModified": "2022-05-23T17:29:17.120",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:14.560",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Virtual Machine IDE Drive Elevation of Privilege Vulnerability."
"value": "Virtual Machine IDE Drive Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21834",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.153",
"lastModified": "2022-05-23T17:29:17.140",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:16.020",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability."
"value": "Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21835",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.213",
"lastModified": "2022-05-23T17:29:17.160",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:16.160",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Cryptographic Services Elevation of Privilege Vulnerability."
"value": "Microsoft Cryptographic Services Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21836",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.270",
"lastModified": "2022-05-23T17:29:17.180",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:16.313",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Certificate Spoofing Vulnerability."
"value": "Windows Certificate Spoofing Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21837",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.323",
"lastModified": "2022-01-14T03:25:32.603",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:16.440",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability."
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21838",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.373",
"lastModified": "2022-05-23T17:29:17.200",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:16.633",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Cleanup Manager Elevation of Privilege Vulnerability."
"value": "Windows Cleanup Manager Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21839",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.430",
"lastModified": "2022-01-14T03:37:20.183",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:16.800",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability."
"value": "Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21840",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.483",
"lastModified": "2022-01-14T16:45:58.913",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:16.927",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Office Remote Code Execution Vulnerability."
"value": "Microsoft Office Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21841",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.537",
"lastModified": "2022-01-14T15:41:08.390",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:17.100",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability."
"value": "Microsoft Excel Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21842",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.590",
"lastModified": "2022-01-14T16:45:49.127",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:17.227",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Word Remote Code Execution Vulnerability."
"value": "Microsoft Word Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21843",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.643",
"lastModified": "2022-05-23T17:29:17.230",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:17.373",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21848, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890."
"value": "Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21846",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.700",
"lastModified": "2022-01-14T17:33:48.753",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:17.570",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21855, CVE-2022-21969."
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,15 +35,13 @@
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
],
"cvssMetricV30": [
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -92,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21847",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.750",
"lastModified": "2022-05-23T17:29:17.253",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:17.770",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Denial of Service Vulnerability."
"value": "Windows Hyper-V Denial of Service Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21848",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.807",
"lastModified": "2022-05-23T17:29:17.260",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:17.863",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890."
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21849",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.860",
"lastModified": "2022-05-23T17:29:17.283",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:17.963",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows IKE Extension Remote Code Execution Vulnerability."
"value": "Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21850",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.917",
"lastModified": "2022-05-23T17:29:17.297",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:18.070",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21851."
"value": "Remote Desktop Client Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21851",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.973",
"lastModified": "2022-05-23T17:29:17.320",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:18.177",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21850."
"value": "Remote Desktop Client Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21852",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.033",
"lastModified": "2022-05-23T17:29:17.343",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:18.290",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21896, CVE-2022-21902."
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-119"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21855",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.087",
"lastModified": "2022-01-14T16:14:19.250",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:18.390",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21846, CVE-2022-21969."
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21857",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.143",
"lastModified": "2022-05-23T17:29:17.357",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:18.480",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability."
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21858",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.200",
"lastModified": "2022-05-23T17:29:17.377",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:18.583",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Bind Filter Driver Elevation of Privilege Vulnerability."
"value": "Windows Bind Filter Driver Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21859",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.257",
"lastModified": "2022-05-23T17:29:17.390",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:18.690",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Accounts Control Elevation of Privilege Vulnerability."
"value": "Windows Accounts Control Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21860",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.313",
"lastModified": "2022-05-23T17:29:17.407",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:18.793",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows AppContracts API Server Elevation of Privilege Vulnerability."
"value": "Windows AppContracts API Server Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21861",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.367",
"lastModified": "2022-05-23T17:29:17.420",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:18.907",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Task Flow Data Engine Elevation of Privilege Vulnerability."
"value": "Task Flow Data Engine Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21862",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.420",
"lastModified": "2022-05-23T17:29:17.437",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.007",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Application Model Core API Elevation of Privilege Vulnerability."
"value": "Windows Application Model Core API Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21863",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.477",
"lastModified": "2022-05-23T17:29:17.460",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.117",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows StateRepository API Server file Elevation of Privilege Vulnerability."
"value": "Windows StateRepository API Server file Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21864",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.530",
"lastModified": "2022-05-23T17:29:17.470",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.210",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows UI Immersive Server API Elevation of Privilege Vulnerability."
"value": "Windows UI Immersive Server API Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21865",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.587",
"lastModified": "2022-05-23T17:29:17.490",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.317",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Connected Devices Platform Service Elevation of Privilege Vulnerability."
"value": "Connected Devices Platform Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21866",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.640",
"lastModified": "2022-05-23T17:29:17.500",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.420",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows System Launcher Elevation of Privilege Vulnerability."
"value": "Windows System Launcher Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21867",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.697",
"lastModified": "2022-05-23T17:29:17.517",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.513",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Push Notifications Apps Elevation Of Privilege Vulnerability."
"value": "Windows Push Notifications Apps Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21868",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.750",
"lastModified": "2022-05-23T17:29:17.533",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.600",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Devices Human Interface Elevation of Privilege Vulnerability."
"value": "Windows Devices Human Interface Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21869",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.800",
"lastModified": "2022-05-23T17:29:17.550",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.697",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Clipboard User Service Elevation of Privilege Vulnerability."
"value": "Clipboard User Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21870",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.857",
"lastModified": "2022-05-23T17:29:17.563",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.787",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability."
"value": "Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21871",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.913",
"lastModified": "2023-03-31T18:31:13.243",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.883",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability."
"value": "Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21872",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.963",
"lastModified": "2022-05-23T17:29:17.597",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:19.990",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Event Tracing Elevation of Privilege Vulnerability."
"value": "Windows Event Tracing Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21873",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.017",
"lastModified": "2022-05-23T17:29:17.607",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:20.093",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Tile Data Repository Elevation of Privilege Vulnerability."
"value": "Tile Data Repository Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21874",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.073",
"lastModified": "2022-05-23T17:29:17.623",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:20.190",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Security Center API Remote Code Execution Vulnerability."
"value": "Windows Security Center API Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21875",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.127",
"lastModified": "2022-05-23T17:29:17.640",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:20.280",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Storage Elevation of Privilege Vulnerability."
"value": "Windows Storage Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21876",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.183",
"lastModified": "2022-05-23T17:29:17.653",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:20.367",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Win32k Information Disclosure Vulnerability."
"value": "Win32k Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21877",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.237",
"lastModified": "2022-05-23T17:29:17.670",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:20.463",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Storage Spaces Controller Information Disclosure Vulnerability."
"value": "Storage Spaces Controller Information Disclosure Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21878",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.290",
"lastModified": "2022-05-23T17:29:17.680",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:20.563",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Geolocation Service Remote Code Execution Vulnerability."
"value": "Windows Geolocation Service Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21879",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.343",
"lastModified": "2022-05-23T17:29:17.693",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:20.683",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21881."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21880",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.400",
"lastModified": "2022-05-23T17:29:17.710",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:20.787",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21915."
"value": "Windows GDI+ Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21881",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.453",
"lastModified": "2022-08-19T10:56:26.280",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:20.893",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21879."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-362"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21882",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.507",
"lastModified": "2022-05-23T17:29:17.750",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:21.003",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-02-04",
"cisaActionDue": "2022-02-18",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
"value": "Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21887."
"value": "Win32k Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -94,7 +94,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-787"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21883",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.560",
"lastModified": "2022-05-23T17:29:17.767",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:21.110",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21889, CVE-2022-21890."
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21884",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.640",
"lastModified": "2022-05-23T17:29:17.787",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:21.210",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability."
"value": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21885",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.693",
"lastModified": "2022-05-23T17:29:17.797",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:21.293",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21914."
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21887",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.747",
"lastModified": "2022-01-19T16:58:49.477",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:21.390",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21882."
"value": "Win32k Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21888",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.800",
"lastModified": "2022-05-23T17:29:17.820",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:21.510",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Modern Execution Server Remote Code Execution Vulnerability."
"value": "Windows Modern Execution Server Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21889",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.853",
"lastModified": "2022-05-23T17:29:17.827",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:21.687",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21883, CVE-2022-21890."
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21890",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.910",
"lastModified": "2022-05-23T17:29:17.847",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:21.807",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21883, CVE-2022-21889."
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21891",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.963",
"lastModified": "2022-01-19T14:15:39.413",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:21.927",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability."
"value": "Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21892",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.017",
"lastModified": "2022-05-23T17:29:17.867",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:22.040",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21893",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.073",
"lastModified": "2022-05-23T17:29:17.880",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:22.173",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Remote Desktop Protocol Remote Code Execution Vulnerability."
"value": "Remote Desktop Protocol Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -37,23 +37,23 @@
"impactScore": 5.9
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
],

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21894",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.130",
"lastModified": "2022-05-23T17:29:17.903",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:22.473",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Secure Boot Security Feature Bypass Vulnerability."
"value": "Secure Boot Security Feature Bypass Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21895",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.187",
"lastModified": "2022-05-23T17:29:17.920",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:22.610",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21919."
"value": "Windows User Profile Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-59"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21896",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.243",
"lastModified": "2022-05-23T17:29:17.937",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:22.823",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21902."
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-362"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21897",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.300",
"lastModified": "2022-05-23T17:29:17.947",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:23.017",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21916."
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21898",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.357",
"lastModified": "2022-05-23T17:29:17.977",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:23.140",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21912."
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21899",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.413",
"lastModified": "2022-01-19T18:05:06.087",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:23.280",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Extensible Firmware Interface Security Feature Bypass Vulnerability."
"value": "Windows Extensible Firmware Interface Security Feature Bypass Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-Other"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21900",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.473",
"lastModified": "2022-05-23T17:29:17.987",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:23.387",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21905."
"value": "Windows Hyper-V Security Feature Bypass Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21901",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.527",
"lastModified": "2022-05-23T17:29:18.000",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:23.507",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Elevation of Privilege Vulnerability."
"value": "Windows Hyper-V Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21902",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.580",
"lastModified": "2022-05-23T17:29:18.013",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:23.663",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21896."
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21903",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.637",
"lastModified": "2022-05-23T17:29:18.023",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:23.773",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows GDI Elevation of Privilege Vulnerability."
"value": "Windows GDI Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21904",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.690",
"lastModified": "2022-05-23T17:29:18.050",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:23.873",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows GDI Information Disclosure Vulnerability."
"value": "Windows GDI Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21905",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.750",
"lastModified": "2022-05-23T17:29:18.110",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:23.990",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21900."
"value": "Windows Hyper-V Security Feature Bypass Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21906",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.807",
"lastModified": "2022-09-27T20:33:07.713",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:24.107",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Defender Application Control Security Feature Bypass Vulnerability."
"value": "Windows Defender Application Control Security Feature Bypass Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21907",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.863",
"lastModified": "2022-08-26T17:46:15.957",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:24.233",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HTTP Protocol Stack Remote Code Execution Vulnerability."
"value": "HTTP Protocol Stack Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21908",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.917",
"lastModified": "2022-05-23T17:29:18.273",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:24.357",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Installer Elevation of Privilege Vulnerability."
"value": "Windows Installer Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21910",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.970",
"lastModified": "2022-05-23T17:29:18.300",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:24.470",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Cluster Port Driver Elevation of Privilege Vulnerability."
"value": "Microsoft Cluster Port Driver Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21911",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.027",
"lastModified": "2022-05-23T17:29:18.310",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:24.580",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": ".NET Framework Denial of Service Vulnerability."
"value": ".NET Framework Denial of Service Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21912",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.083",
"lastModified": "2022-05-23T17:29:18.410",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:24.813",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21898."
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21913",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.137",
"lastModified": "2022-05-23T17:29:18.420",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:24.950",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass."
"value": "Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-863"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21914",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.197",
"lastModified": "2022-05-23T17:29:18.447",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:25.090",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21885."
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21915",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.250",
"lastModified": "2022-05-23T17:29:18.470",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:25.220",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21880."
"value": "Windows GDI+ Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-668"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21916",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.307",
"lastModified": "2022-05-23T17:29:18.493",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:25.343",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21897."
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21917",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.360",
"lastModified": "2022-04-01T14:30:07.997",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:25.470",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability."
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21918",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.410",
"lastModified": "2022-05-23T17:29:18.517",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:25.640",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "DirectX Graphics Kernel File Denial of Service Vulnerability."
"value": "DirectX Graphics Kernel File Denial of Service Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-400"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21919",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.463",
"lastModified": "2022-05-23T17:29:18.527",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:25.740",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
"value": "Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21895."
"value": "Windows User Profile Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -74,7 +74,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "CWE-59"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21920",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.520",
"lastModified": "2022-05-23T17:29:18.547",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:25.843",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kerberos Elevation of Privilege Vulnerability."
"value": "Windows Kerberos Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,15 +35,13 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -92,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21921",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.567",
"lastModified": "2022-05-23T17:29:18.573",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:26.097",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability."
"value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21922",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.623",
"lastModified": "2022-05-23T17:29:18.587",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:26.220",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability."
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -35,15 +35,13 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21924",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.667",
"lastModified": "2022-05-23T17:29:18.610",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:26.450",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Workstation Service Remote Protocol Security Feature Bypass Vulnerability."
"value": "Workstation Service Remote Protocol Security Feature Bypass Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21925",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.723",
"lastModified": "2022-01-21T17:32:21.970",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:26.577",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows BackupKey Remote Protocol Security Feature Bypass Vulnerability."
"value": "Windows BackupKey Remote Protocol Security Feature Bypass Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21928",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.777",
"lastModified": "2022-05-23T17:29:18.637",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:26.770",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -90,7 +90,7 @@
"description": [
{
"lang": "en",
"value": "CWE-94"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21929",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.830",
"lastModified": "2022-01-20T19:23:30.300",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:26.870",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21930, CVE-2022-21931."
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21930",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.887",
"lastModified": "2022-01-20T19:35:50.767",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:26.990",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21929, CVE-2022-21931."
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21931",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.937",
"lastModified": "2022-01-20T19:28:42.980",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:27.110",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21929, CVE-2022-21930."
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21932",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.993",
"lastModified": "2022-01-20T18:48:25.657",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:27.207",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability."
"value": "Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21954",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.047",
"lastModified": "2022-01-20T19:31:24.330",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:27.307",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21970."
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,7 +70,7 @@
"description": [
{
"lang": "en",
"value": "CWE-269"
"value": "NVD-CWE-noinfo"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21957",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-02-09T17:15:08.480",
"lastModified": "2023-06-29T05:15:09.773",
"lastModified": "2023-12-21T01:15:27.397",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability"
"value": "Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21958",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.100",
"lastModified": "2022-05-23T17:29:18.650",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:27.537",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21959",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.150",
"lastModified": "2022-05-23T17:29:18.663",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:27.680",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21960",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.203",
"lastModified": "2022-05-23T17:29:18.677",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:27.813",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
},
{
"lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21961",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.260",
"lastModified": "2022-05-23T17:29:18.690",
"vulnStatus": "Analyzed",
"lastModified": "2023-12-21T01:15:27.917",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21962, CVE-2022-21963."
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
},
{
"lang": "es",

Some files were not shown because too many files have changed in this diff Show More