mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-06 18:52:58 +00:00
Auto-Update: 2023-12-21T03:00:24.953207+00:00
This commit is contained in:
parent
f28f07566d
commit
afd242a537
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2015-4852",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2015-11-18T15:59:00.133",
|
||||
"lastModified": "2019-03-28T19:29:00.277",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-12-21T01:31:11.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cisaExploitAdd": "2021-11-03",
|
||||
"cisaActionDue": "2022-05-03",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
"cisaVulnerabilityName": "Oracle WebLogic Server Remote Code Execution Vulnerability",
|
||||
"cisaVulnerabilityName": "Oracle WebLogic Server Deserialization of Untrusted Data Vulnerability",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -19,6 +19,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
@ -52,7 +74,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -80,6 +102,11 @@
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E55B3AA9-69BE-4136-8C3A-FD0DDCD3FA4B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
|
||||
@ -110,39 +137,56 @@
|
||||
"url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Technical Description"
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.openwall.com/lists/oss-security/2015/11/17/19",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2015-4852-2763333.html",
|
||||
@ -161,33 +205,49 @@
|
||||
},
|
||||
{
|
||||
"url": "http://www.securityfocus.com/bid/77539",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "http://www.securitytracker.com/id/1038292",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://blogs.oracle.com/security/entry/security_alert_cve_2015_4852",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/42806/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.exploit-db.com/exploits/46628/",
|
||||
"source": "secalert_us@oracle.com"
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-2241",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2020-09-01T14:15:12.783",
|
||||
"lastModified": "2023-10-25T18:16:38.553",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-12-21T01:43:39.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2020-2281",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2020-09-23T14:15:13.210",
|
||||
"lastModified": "2023-10-25T18:16:40.967",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-12-21T01:40:58.930",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -98,6 +98,7 @@
|
||||
"url": "http://www.openwall.com/lists/oss-security/2020/09/23/1",
|
||||
"source": "jenkinsci-cert@googlegroups.com",
|
||||
"tags": [
|
||||
"Mailing List",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-21665",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2021-06-10T15:15:08.977",
|
||||
"lastModified": "2023-10-25T18:16:50.660",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2023-12-21T01:47:29.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -21,19 +21,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.0,
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
@ -63,6 +63,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21833",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.090",
|
||||
"lastModified": "2022-05-23T17:29:17.120",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:14.560",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Virtual Machine IDE Drive Elevation of Privilege Vulnerability."
|
||||
"value": "Virtual Machine IDE Drive Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21834",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.153",
|
||||
"lastModified": "2022-05-23T17:29:17.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:16.020",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability."
|
||||
"value": "Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21835",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.213",
|
||||
"lastModified": "2022-05-23T17:29:17.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:16.160",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Cryptographic Services Elevation of Privilege Vulnerability."
|
||||
"value": "Microsoft Cryptographic Services Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21836",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.270",
|
||||
"lastModified": "2022-05-23T17:29:17.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:16.313",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Certificate Spoofing Vulnerability."
|
||||
"value": "Windows Certificate Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21837",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.323",
|
||||
"lastModified": "2022-01-14T03:25:32.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:16.440",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21838",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.373",
|
||||
"lastModified": "2022-05-23T17:29:17.200",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:16.633",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Cleanup Manager Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Cleanup Manager Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21839",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.430",
|
||||
"lastModified": "2022-01-14T03:37:20.183",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:16.800",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability."
|
||||
"value": "Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21840",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.483",
|
||||
"lastModified": "2022-01-14T16:45:58.913",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:16.927",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Office Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Office Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21841",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.537",
|
||||
"lastModified": "2022-01-14T15:41:08.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:17.100",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Excel Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Excel Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21842",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.590",
|
||||
"lastModified": "2022-01-14T16:45:49.127",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:17.227",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Word Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Word Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21843",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.643",
|
||||
"lastModified": "2022-05-23T17:29:17.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:17.373",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21848, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890."
|
||||
"value": "Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21846",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.700",
|
||||
"lastModified": "2022-01-14T17:33:48.753",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:17.570",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21855, CVE-2022-21969."
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -35,15 +35,13 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -92,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21847",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.750",
|
||||
"lastModified": "2022-05-23T17:29:17.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:17.770",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hyper-V Denial of Service Vulnerability."
|
||||
"value": "Windows Hyper-V Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21848",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.807",
|
||||
"lastModified": "2022-05-23T17:29:17.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:17.863",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890."
|
||||
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21849",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.860",
|
||||
"lastModified": "2022-05-23T17:29:17.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:17.963",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows IKE Extension Remote Code Execution Vulnerability."
|
||||
"value": "Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21850",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.917",
|
||||
"lastModified": "2022-05-23T17:29:17.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:18.070",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21851."
|
||||
"value": "Remote Desktop Client Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21851",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:09.973",
|
||||
"lastModified": "2022-05-23T17:29:17.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:18.177",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21850."
|
||||
"value": "Remote Desktop Client Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21852",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.033",
|
||||
"lastModified": "2022-05-23T17:29:17.343",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:18.290",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21896, CVE-2022-21902."
|
||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21855",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.087",
|
||||
"lastModified": "2022-01-14T16:14:19.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:18.390",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21846, CVE-2022-21969."
|
||||
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21857",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.143",
|
||||
"lastModified": "2022-05-23T17:29:17.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:18.480",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability."
|
||||
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21858",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.200",
|
||||
"lastModified": "2022-05-23T17:29:17.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:18.583",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Bind Filter Driver Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Bind Filter Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21859",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.257",
|
||||
"lastModified": "2022-05-23T17:29:17.390",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:18.690",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Accounts Control Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Accounts Control Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21860",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.313",
|
||||
"lastModified": "2022-05-23T17:29:17.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:18.793",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows AppContracts API Server Elevation of Privilege Vulnerability."
|
||||
"value": "Windows AppContracts API Server Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21861",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.367",
|
||||
"lastModified": "2022-05-23T17:29:17.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:18.907",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Task Flow Data Engine Elevation of Privilege Vulnerability."
|
||||
"value": "Task Flow Data Engine Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21862",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.420",
|
||||
"lastModified": "2022-05-23T17:29:17.437",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.007",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Application Model Core API Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Application Model Core API Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21863",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.477",
|
||||
"lastModified": "2022-05-23T17:29:17.460",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.117",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows StateRepository API Server file Elevation of Privilege Vulnerability."
|
||||
"value": "Windows StateRepository API Server file Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21864",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.530",
|
||||
"lastModified": "2022-05-23T17:29:17.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.210",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows UI Immersive Server API Elevation of Privilege Vulnerability."
|
||||
"value": "Windows UI Immersive Server API Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21865",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.587",
|
||||
"lastModified": "2022-05-23T17:29:17.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.317",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Connected Devices Platform Service Elevation of Privilege Vulnerability."
|
||||
"value": "Connected Devices Platform Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21866",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.640",
|
||||
"lastModified": "2022-05-23T17:29:17.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.420",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows System Launcher Elevation of Privilege Vulnerability."
|
||||
"value": "Windows System Launcher Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21867",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.697",
|
||||
"lastModified": "2022-05-23T17:29:17.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.513",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Push Notifications Apps Elevation Of Privilege Vulnerability."
|
||||
"value": "Windows Push Notifications Apps Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21868",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.750",
|
||||
"lastModified": "2022-05-23T17:29:17.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.600",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Devices Human Interface Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Devices Human Interface Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21869",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.800",
|
||||
"lastModified": "2022-05-23T17:29:17.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.697",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Clipboard User Service Elevation of Privilege Vulnerability."
|
||||
"value": "Clipboard User Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21870",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.857",
|
||||
"lastModified": "2022-05-23T17:29:17.563",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.787",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability."
|
||||
"value": "Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21871",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.913",
|
||||
"lastModified": "2023-03-31T18:31:13.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.883",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability."
|
||||
"value": "Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21872",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:10.963",
|
||||
"lastModified": "2022-05-23T17:29:17.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:19.990",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Event Tracing Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Event Tracing Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21873",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.017",
|
||||
"lastModified": "2022-05-23T17:29:17.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:20.093",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tile Data Repository Elevation of Privilege Vulnerability."
|
||||
"value": "Tile Data Repository Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21874",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.073",
|
||||
"lastModified": "2022-05-23T17:29:17.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:20.190",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Security Center API Remote Code Execution Vulnerability."
|
||||
"value": "Windows Security Center API Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21875",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.127",
|
||||
"lastModified": "2022-05-23T17:29:17.640",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:20.280",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Storage Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Storage Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21876",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.183",
|
||||
"lastModified": "2022-05-23T17:29:17.653",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:20.367",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Win32k Information Disclosure Vulnerability."
|
||||
"value": "Win32k Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21877",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.237",
|
||||
"lastModified": "2022-05-23T17:29:17.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:20.463",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Storage Spaces Controller Information Disclosure Vulnerability."
|
||||
"value": "Storage Spaces Controller Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21878",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.290",
|
||||
"lastModified": "2022-05-23T17:29:17.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:20.563",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Geolocation Service Remote Code Execution Vulnerability."
|
||||
"value": "Windows Geolocation Service Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21879",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.343",
|
||||
"lastModified": "2022-05-23T17:29:17.693",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:20.683",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21881."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21880",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.400",
|
||||
"lastModified": "2022-05-23T17:29:17.710",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:20.787",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21915."
|
||||
"value": "Windows GDI+ Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21881",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.453",
|
||||
"lastModified": "2022-08-19T10:56:26.280",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:20.893",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21879."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-21882",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.507",
|
||||
"lastModified": "2022-05-23T17:29:17.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:21.003",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2022-02-04",
|
||||
"cisaActionDue": "2022-02-18",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -11,7 +11,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21887."
|
||||
"value": "Win32k Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -94,7 +94,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21883",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.560",
|
||||
"lastModified": "2022-05-23T17:29:17.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:21.110",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21889, CVE-2022-21890."
|
||||
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21884",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.640",
|
||||
"lastModified": "2022-05-23T17:29:17.787",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:21.210",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability."
|
||||
"value": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21885",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.693",
|
||||
"lastModified": "2022-05-23T17:29:17.797",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:21.293",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21914."
|
||||
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21887",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.747",
|
||||
"lastModified": "2022-01-19T16:58:49.477",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:21.390",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21882."
|
||||
"value": "Win32k Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21888",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.800",
|
||||
"lastModified": "2022-05-23T17:29:17.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:21.510",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Modern Execution Server Remote Code Execution Vulnerability."
|
||||
"value": "Windows Modern Execution Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21889",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.853",
|
||||
"lastModified": "2022-05-23T17:29:17.827",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:21.687",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21883, CVE-2022-21890."
|
||||
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21890",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.910",
|
||||
"lastModified": "2022-05-23T17:29:17.847",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:21.807",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21883, CVE-2022-21889."
|
||||
"value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21891",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:11.963",
|
||||
"lastModified": "2022-01-19T14:15:39.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:21.927",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability."
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21892",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.017",
|
||||
"lastModified": "2022-05-23T17:29:17.867",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:22.040",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21893",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.073",
|
||||
"lastModified": "2022-05-23T17:29:17.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:22.173",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Remote Desktop Protocol Remote Code Execution Vulnerability."
|
||||
"value": "Remote Desktop Protocol Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -37,23 +37,23 @@
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.8,
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21894",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.130",
|
||||
"lastModified": "2022-05-23T17:29:17.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:22.473",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Secure Boot Security Feature Bypass Vulnerability."
|
||||
"value": "Secure Boot Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21895",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.187",
|
||||
"lastModified": "2022-05-23T17:29:17.920",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:22.610",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21919."
|
||||
"value": "Windows User Profile Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21896",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.243",
|
||||
"lastModified": "2022-05-23T17:29:17.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:22.823",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21902."
|
||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-362"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21897",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.300",
|
||||
"lastModified": "2022-05-23T17:29:17.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:23.017",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21916."
|
||||
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21898",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.357",
|
||||
"lastModified": "2022-05-23T17:29:17.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:23.140",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21912."
|
||||
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21899",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.413",
|
||||
"lastModified": "2022-01-19T18:05:06.087",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:23.280",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Extensible Firmware Interface Security Feature Bypass Vulnerability."
|
||||
"value": "Windows Extensible Firmware Interface Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21900",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.473",
|
||||
"lastModified": "2022-05-23T17:29:17.987",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:23.387",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21905."
|
||||
"value": "Windows Hyper-V Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21901",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.527",
|
||||
"lastModified": "2022-05-23T17:29:18.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:23.507",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hyper-V Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Hyper-V Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21902",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.580",
|
||||
"lastModified": "2022-05-23T17:29:18.013",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:23.663",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21896."
|
||||
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21903",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.637",
|
||||
"lastModified": "2022-05-23T17:29:18.023",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:23.773",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows GDI Elevation of Privilege Vulnerability."
|
||||
"value": "Windows GDI Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21904",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.690",
|
||||
"lastModified": "2022-05-23T17:29:18.050",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:23.873",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows GDI Information Disclosure Vulnerability."
|
||||
"value": "Windows GDI Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21905",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.750",
|
||||
"lastModified": "2022-05-23T17:29:18.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:23.990",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21900."
|
||||
"value": "Windows Hyper-V Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21906",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.807",
|
||||
"lastModified": "2022-09-27T20:33:07.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:24.107",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Defender Application Control Security Feature Bypass Vulnerability."
|
||||
"value": "Windows Defender Application Control Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21907",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.863",
|
||||
"lastModified": "2022-08-26T17:46:15.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:24.233",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HTTP Protocol Stack Remote Code Execution Vulnerability."
|
||||
"value": "HTTP Protocol Stack Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21908",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.917",
|
||||
"lastModified": "2022-05-23T17:29:18.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:24.357",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Installer Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Installer Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21910",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:12.970",
|
||||
"lastModified": "2022-05-23T17:29:18.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:24.470",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Cluster Port Driver Elevation of Privilege Vulnerability."
|
||||
"value": "Microsoft Cluster Port Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21911",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.027",
|
||||
"lastModified": "2022-05-23T17:29:18.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:24.580",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ".NET Framework Denial of Service Vulnerability."
|
||||
"value": ".NET Framework Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21912",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.083",
|
||||
"lastModified": "2022-05-23T17:29:18.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:24.813",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21898."
|
||||
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21913",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.137",
|
||||
"lastModified": "2022-05-23T17:29:18.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:24.950",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass."
|
||||
"value": "Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21914",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.197",
|
||||
"lastModified": "2022-05-23T17:29:18.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:25.090",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21885."
|
||||
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21915",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.250",
|
||||
"lastModified": "2022-05-23T17:29:18.470",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:25.220",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21880."
|
||||
"value": "Windows GDI+ Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-668"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21916",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.307",
|
||||
"lastModified": "2022-05-23T17:29:18.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:25.343",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21897."
|
||||
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21917",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.360",
|
||||
"lastModified": "2022-04-01T14:30:07.997",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:25.470",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HEVC Video Extensions Remote Code Execution Vulnerability."
|
||||
"value": "HEVC Video Extensions Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21918",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.410",
|
||||
"lastModified": "2022-05-23T17:29:18.517",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:25.640",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DirectX Graphics Kernel File Denial of Service Vulnerability."
|
||||
"value": "DirectX Graphics Kernel File Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-21919",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.463",
|
||||
"lastModified": "2022-05-23T17:29:18.527",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:25.740",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2022-04-25",
|
||||
"cisaActionDue": "2022-05-16",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -11,7 +11,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21895."
|
||||
"value": "Windows User Profile Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -74,7 +74,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "CWE-59"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21920",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.520",
|
||||
"lastModified": "2022-05-23T17:29:18.547",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:25.843",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kerberos Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Kerberos Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -35,15 +35,13 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
@ -92,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21921",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.567",
|
||||
"lastModified": "2022-05-23T17:29:18.573",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:26.097",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability."
|
||||
"value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21922",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.623",
|
||||
"lastModified": "2022-05-23T17:29:18.587",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:26.220",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability."
|
||||
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -35,15 +35,13 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21924",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.667",
|
||||
"lastModified": "2022-05-23T17:29:18.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:26.450",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Workstation Service Remote Protocol Security Feature Bypass Vulnerability."
|
||||
"value": "Workstation Service Remote Protocol Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21925",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.723",
|
||||
"lastModified": "2022-01-21T17:32:21.970",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:26.577",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows BackupKey Remote Protocol Security Feature Bypass Vulnerability."
|
||||
"value": "Windows BackupKey Remote Protocol Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21928",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.777",
|
||||
"lastModified": "2022-05-23T17:29:18.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:26.770",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -90,7 +90,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21929",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.830",
|
||||
"lastModified": "2022-01-20T19:23:30.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:26.870",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21930, CVE-2022-21931."
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21930",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.887",
|
||||
"lastModified": "2022-01-20T19:35:50.767",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:26.990",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21929, CVE-2022-21931."
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21931",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.937",
|
||||
"lastModified": "2022-01-20T19:28:42.980",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:27.110",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21929, CVE-2022-21930."
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21932",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:13.993",
|
||||
"lastModified": "2022-01-20T18:48:25.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:27.207",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability."
|
||||
"value": "Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21954",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:14.047",
|
||||
"lastModified": "2022-01-20T19:31:24.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:27.307",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21970."
|
||||
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,7 +70,7 @@
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21957",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-02-09T17:15:08.480",
|
||||
"lastModified": "2023-06-29T05:15:09.773",
|
||||
"lastModified": "2023-12-21T01:15:27.397",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability"
|
||||
"value": "Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21958",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:14.100",
|
||||
"lastModified": "2022-05-23T17:29:18.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:27.537",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21959",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:14.150",
|
||||
"lastModified": "2022-05-23T17:29:18.663",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:27.680",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21960",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:14.203",
|
||||
"lastModified": "2022-05-23T17:29:18.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:27.813",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963."
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-21961",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-01-11T21:15:14.260",
|
||||
"lastModified": "2022-05-23T17:29:18.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-12-21T01:15:27.917",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21962, CVE-2022-21963."
|
||||
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user