Auto-Update: 2023-12-21T03:00:24.953207+00:00

This commit is contained in:
cad-safe-bot 2023-12-21 03:00:28 +00:00
parent f28f07566d
commit afd242a537
184 changed files with 1577 additions and 645 deletions

View File

@ -2,12 +2,12 @@
"id": "CVE-2015-4852", "id": "CVE-2015-4852",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2015-11-18T15:59:00.133", "published": "2015-11-18T15:59:00.133",
"lastModified": "2019-03-28T19:29:00.277", "lastModified": "2023-12-21T01:31:11.820",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"cisaExploitAdd": "2021-11-03", "cisaExploitAdd": "2021-11-03",
"cisaActionDue": "2022-05-03", "cisaActionDue": "2022-05-03",
"cisaRequiredAction": "Apply updates per vendor instructions.", "cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "Oracle WebLogic Server Remote Code Execution Vulnerability", "cisaVulnerabilityName": "Oracle WebLogic Server Deserialization of Untrusted Data Vulnerability",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -19,6 +19,28 @@
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [ "cvssMetricV2": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",
@ -52,7 +74,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-77" "value": "CWE-502"
} }
] ]
} }
@ -80,6 +102,11 @@
"operator": "OR", "operator": "OR",
"negate": false, "negate": false,
"cpeMatch": [ "cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:storagetek_tape_analytics_sw_tool:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E55B3AA9-69BE-4136-8C3A-FD0DDCD3FA4B"
},
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:oracle:weblogic_server:10.3.6.0.0:*:*:*:*:*:*:*",
@ -110,39 +137,56 @@
"url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Exploit", "Exploit"
"Technical Description"
] ]
}, },
{ {
"url": "http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/152268/Oracle-Weblogic-Server-Deserialization-Remote-Code-Execution.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2015/11/17/19", "url": "http://www.openwall.com/lists/oss-security/2015/11/17/19",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Mailing List",
"Third Party Advisory" "Third Party Advisory"
] ]
}, },
{ {
"url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Patch",
"Vendor Advisory" "Vendor Advisory"
] ]
}, },
{ {
"url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2015-4852-2763333.html", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2015-4852-2763333.html",
@ -161,33 +205,49 @@
}, },
{ {
"url": "http://www.securityfocus.com/bid/77539", "url": "http://www.securityfocus.com/bid/77539",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "http://www.securitytracker.com/id/1038292", "url": "http://www.securitytracker.com/id/1038292",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://blogs.oracle.com/security/entry/security_alert_cve_2015_4852", "url": "https://blogs.oracle.com/security/entry/security_alert_cve_2015_4852",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Vendor Advisory" "Broken Link"
] ]
}, },
{ {
"url": "https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py", "url": "https://github.com/foxglovesec/JavaUnserializeExploits/blob/master/weblogic.py",
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"tags": [ "tags": [
"Exploit" "Product"
] ]
}, },
{ {
"url": "https://www.exploit-db.com/exploits/42806/", "url": "https://www.exploit-db.com/exploits/42806/",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
}, },
{ {
"url": "https://www.exploit-db.com/exploits/46628/", "url": "https://www.exploit-db.com/exploits/46628/",
"source": "secalert_us@oracle.com" "source": "secalert_us@oracle.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-2241", "id": "CVE-2020-2241",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com", "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-01T14:15:12.783", "published": "2020-09-01T14:15:12.783",
"lastModified": "2023-10-25T18:16:38.553", "lastModified": "2023-12-21T01:43:39.437",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2020-2281", "id": "CVE-2020-2281",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com", "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2020-09-23T14:15:13.210", "published": "2020-09-23T14:15:13.210",
"lastModified": "2023-10-25T18:16:40.967", "lastModified": "2023-12-21T01:40:58.930",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -98,6 +98,7 @@
"url": "http://www.openwall.com/lists/oss-security/2020/09/23/1", "url": "http://www.openwall.com/lists/oss-security/2020/09/23/1",
"source": "jenkinsci-cert@googlegroups.com", "source": "jenkinsci-cert@googlegroups.com",
"tags": [ "tags": [
"Mailing List",
"Third Party Advisory" "Third Party Advisory"
] ]
}, },

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-21665", "id": "CVE-2021-21665",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com", "sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2021-06-10T15:15:08.977", "published": "2021-06-10T15:15:08.977",
"lastModified": "2023-10-25T18:16:50.660", "lastModified": "2023-12-21T01:47:29.513",
"vulnStatus": "Modified", "vulnStatus": "Analyzed",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
@ -21,19 +21,19 @@
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "NONE",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "HIGH",
"integrityImpact": "HIGH", "integrityImpact": "HIGH",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 8.0, "baseScore": 8.8,
"baseSeverity": "HIGH" "baseSeverity": "HIGH"
}, },
"exploitabilityScore": 2.1, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
} }
], ],
@ -63,6 +63,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [ "configurations": [
{ {
"nodes": [ "nodes": [

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21833", "id": "CVE-2022-21833",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.090", "published": "2022-01-11T21:15:09.090",
"lastModified": "2022-05-23T17:29:17.120", "lastModified": "2023-12-21T01:15:14.560",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Virtual Machine IDE Drive Elevation of Privilege Vulnerability." "value": "Virtual Machine IDE Drive Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21834", "id": "CVE-2022-21834",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.153", "published": "2022-01-11T21:15:09.153",
"lastModified": "2022-05-23T17:29:17.140", "lastModified": "2023-12-21T01:15:16.020",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability." "value": "Windows User-mode Driver Framework Reflector Driver Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21835", "id": "CVE-2022-21835",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.213", "published": "2022-01-11T21:15:09.213",
"lastModified": "2022-05-23T17:29:17.160", "lastModified": "2023-12-21T01:15:16.160",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Cryptographic Services Elevation of Privilege Vulnerability." "value": "Microsoft Cryptographic Services Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21836", "id": "CVE-2022-21836",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.270", "published": "2022-01-11T21:15:09.270",
"lastModified": "2022-05-23T17:29:17.180", "lastModified": "2023-12-21T01:15:16.313",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Certificate Spoofing Vulnerability." "value": "Windows Certificate Spoofing Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21837", "id": "CVE-2022-21837",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.323", "published": "2022-01-11T21:15:09.323",
"lastModified": "2022-01-14T03:25:32.603", "lastModified": "2023-12-21T01:15:16.440",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft SharePoint Server Remote Code Execution Vulnerability." "value": "Microsoft SharePoint Server Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-94" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21838", "id": "CVE-2022-21838",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.373", "published": "2022-01-11T21:15:09.373",
"lastModified": "2022-05-23T17:29:17.200", "lastModified": "2023-12-21T01:15:16.633",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Cleanup Manager Elevation of Privilege Vulnerability." "value": "Windows Cleanup Manager Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21839", "id": "CVE-2022-21839",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.430", "published": "2022-01-11T21:15:09.430",
"lastModified": "2022-01-14T03:37:20.183", "lastModified": "2023-12-21T01:15:16.800",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability." "value": "Windows Event Tracing Discretionary Access Control List Denial of Service Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-400" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21840", "id": "CVE-2022-21840",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.483", "published": "2022-01-11T21:15:09.483",
"lastModified": "2022-01-14T16:45:58.913", "lastModified": "2023-12-21T01:15:16.927",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Office Remote Code Execution Vulnerability." "value": "Microsoft Office Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-94" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21841", "id": "CVE-2022-21841",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.537", "published": "2022-01-11T21:15:09.537",
"lastModified": "2022-01-14T15:41:08.390", "lastModified": "2023-12-21T01:15:17.100",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability." "value": "Microsoft Excel Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21842", "id": "CVE-2022-21842",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.590", "published": "2022-01-11T21:15:09.590",
"lastModified": "2022-01-14T16:45:49.127", "lastModified": "2023-12-21T01:15:17.227",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Word Remote Code Execution Vulnerability." "value": "Microsoft Word Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-94" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21843", "id": "CVE-2022-21843",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.643", "published": "2022-01-11T21:15:09.643",
"lastModified": "2022-05-23T17:29:17.230", "lastModified": "2023-12-21T01:15:17.373",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21848, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890." "value": "Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-400" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21846", "id": "CVE-2022-21846",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.700", "published": "2022-01-11T21:15:09.700",
"lastModified": "2022-01-14T17:33:48.753", "lastModified": "2023-12-21T01:15:17.570",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21855, CVE-2022-21969." "value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -17,7 +17,7 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "secure@microsoft.com",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -35,15 +35,13 @@
}, },
"exploitabilityScore": 2.3, "exploitabilityScore": 2.3,
"impactScore": 6.0 "impactScore": 6.0
} },
],
"cvssMetricV30": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK", "attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -92,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-94" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21847", "id": "CVE-2022-21847",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.750", "published": "2022-01-11T21:15:09.750",
"lastModified": "2022-05-23T17:29:17.253", "lastModified": "2023-12-21T01:15:17.770",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Hyper-V Denial of Service Vulnerability." "value": "Windows Hyper-V Denial of Service Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-400" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21848", "id": "CVE-2022-21848",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.807", "published": "2022-01-11T21:15:09.807",
"lastModified": "2022-05-23T17:29:17.260", "lastModified": "2023-12-21T01:15:17.863",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21883, CVE-2022-21889, CVE-2022-21890." "value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-400" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21849", "id": "CVE-2022-21849",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.860", "published": "2022-01-11T21:15:09.860",
"lastModified": "2022-05-23T17:29:17.283", "lastModified": "2023-12-21T01:15:17.963",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows IKE Extension Remote Code Execution Vulnerability." "value": "Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21850", "id": "CVE-2022-21850",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.917", "published": "2022-01-11T21:15:09.917",
"lastModified": "2022-05-23T17:29:17.297", "lastModified": "2023-12-21T01:15:18.070",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21851." "value": "Remote Desktop Client Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21851", "id": "CVE-2022-21851",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:09.973", "published": "2022-01-11T21:15:09.973",
"lastModified": "2022-05-23T17:29:17.320", "lastModified": "2023-12-21T01:15:18.177",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Remote Desktop Client Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21850." "value": "Remote Desktop Client Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21852", "id": "CVE-2022-21852",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.033", "published": "2022-01-11T21:15:10.033",
"lastModified": "2022-05-23T17:29:17.343", "lastModified": "2023-12-21T01:15:18.290",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21896, CVE-2022-21902." "value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "CWE-119"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21855", "id": "CVE-2022-21855",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.087", "published": "2022-01-11T21:15:10.087",
"lastModified": "2022-01-14T16:14:19.250", "lastModified": "2023-12-21T01:15:18.390",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Exchange Server Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21846, CVE-2022-21969." "value": "Microsoft Exchange Server Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21857", "id": "CVE-2022-21857",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.143", "published": "2022-01-11T21:15:10.143",
"lastModified": "2022-05-23T17:29:17.357", "lastModified": "2023-12-21T01:15:18.480",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability." "value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21858", "id": "CVE-2022-21858",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.200", "published": "2022-01-11T21:15:10.200",
"lastModified": "2022-05-23T17:29:17.377", "lastModified": "2023-12-21T01:15:18.583",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Bind Filter Driver Elevation of Privilege Vulnerability." "value": "Windows Bind Filter Driver Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21859", "id": "CVE-2022-21859",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.257", "published": "2022-01-11T21:15:10.257",
"lastModified": "2022-05-23T17:29:17.390", "lastModified": "2023-12-21T01:15:18.690",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Accounts Control Elevation of Privilege Vulnerability." "value": "Windows Accounts Control Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21860", "id": "CVE-2022-21860",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.313", "published": "2022-01-11T21:15:10.313",
"lastModified": "2022-05-23T17:29:17.407", "lastModified": "2023-12-21T01:15:18.793",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows AppContracts API Server Elevation of Privilege Vulnerability." "value": "Windows AppContracts API Server Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21861", "id": "CVE-2022-21861",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.367", "published": "2022-01-11T21:15:10.367",
"lastModified": "2022-05-23T17:29:17.420", "lastModified": "2023-12-21T01:15:18.907",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Task Flow Data Engine Elevation of Privilege Vulnerability." "value": "Task Flow Data Engine Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21862", "id": "CVE-2022-21862",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.420", "published": "2022-01-11T21:15:10.420",
"lastModified": "2022-05-23T17:29:17.437", "lastModified": "2023-12-21T01:15:19.007",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Application Model Core API Elevation of Privilege Vulnerability." "value": "Windows Application Model Core API Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21863", "id": "CVE-2022-21863",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.477", "published": "2022-01-11T21:15:10.477",
"lastModified": "2022-05-23T17:29:17.460", "lastModified": "2023-12-21T01:15:19.117",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows StateRepository API Server file Elevation of Privilege Vulnerability." "value": "Windows StateRepository API Server file Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21864", "id": "CVE-2022-21864",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.530", "published": "2022-01-11T21:15:10.530",
"lastModified": "2022-05-23T17:29:17.470", "lastModified": "2023-12-21T01:15:19.210",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows UI Immersive Server API Elevation of Privilege Vulnerability." "value": "Windows UI Immersive Server API Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21865", "id": "CVE-2022-21865",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.587", "published": "2022-01-11T21:15:10.587",
"lastModified": "2022-05-23T17:29:17.490", "lastModified": "2023-12-21T01:15:19.317",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Connected Devices Platform Service Elevation of Privilege Vulnerability." "value": "Connected Devices Platform Service Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21866", "id": "CVE-2022-21866",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.640", "published": "2022-01-11T21:15:10.640",
"lastModified": "2022-05-23T17:29:17.500", "lastModified": "2023-12-21T01:15:19.420",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows System Launcher Elevation of Privilege Vulnerability." "value": "Windows System Launcher Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21867", "id": "CVE-2022-21867",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.697", "published": "2022-01-11T21:15:10.697",
"lastModified": "2022-05-23T17:29:17.517", "lastModified": "2023-12-21T01:15:19.513",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Push Notifications Apps Elevation Of Privilege Vulnerability." "value": "Windows Push Notifications Apps Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21868", "id": "CVE-2022-21868",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.750", "published": "2022-01-11T21:15:10.750",
"lastModified": "2022-05-23T17:29:17.533", "lastModified": "2023-12-21T01:15:19.600",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Devices Human Interface Elevation of Privilege Vulnerability." "value": "Windows Devices Human Interface Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21869", "id": "CVE-2022-21869",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.800", "published": "2022-01-11T21:15:10.800",
"lastModified": "2022-05-23T17:29:17.550", "lastModified": "2023-12-21T01:15:19.697",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Clipboard User Service Elevation of Privilege Vulnerability." "value": "Clipboard User Service Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21870", "id": "CVE-2022-21870",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.857", "published": "2022-01-11T21:15:10.857",
"lastModified": "2022-05-23T17:29:17.563", "lastModified": "2023-12-21T01:15:19.787",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability." "value": "Tablet Windows User Interface Application Core Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21871", "id": "CVE-2022-21871",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.913", "published": "2022-01-11T21:15:10.913",
"lastModified": "2023-03-31T18:31:13.243", "lastModified": "2023-12-21T01:15:19.883",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability." "value": "Microsoft Diagnostics Hub Standard Collector Runtime Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21872", "id": "CVE-2022-21872",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:10.963", "published": "2022-01-11T21:15:10.963",
"lastModified": "2022-05-23T17:29:17.597", "lastModified": "2023-12-21T01:15:19.990",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Event Tracing Elevation of Privilege Vulnerability." "value": "Windows Event Tracing Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21873", "id": "CVE-2022-21873",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.017", "published": "2022-01-11T21:15:11.017",
"lastModified": "2022-05-23T17:29:17.607", "lastModified": "2023-12-21T01:15:20.093",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Tile Data Repository Elevation of Privilege Vulnerability." "value": "Tile Data Repository Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21874", "id": "CVE-2022-21874",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.073", "published": "2022-01-11T21:15:11.073",
"lastModified": "2022-05-23T17:29:17.623", "lastModified": "2023-12-21T01:15:20.190",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Security Center API Remote Code Execution Vulnerability." "value": "Windows Security Center API Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-94" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21875", "id": "CVE-2022-21875",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.127", "published": "2022-01-11T21:15:11.127",
"lastModified": "2022-05-23T17:29:17.640", "lastModified": "2023-12-21T01:15:20.280",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Storage Elevation of Privilege Vulnerability." "value": "Windows Storage Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21876", "id": "CVE-2022-21876",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.183", "published": "2022-01-11T21:15:11.183",
"lastModified": "2022-05-23T17:29:17.653", "lastModified": "2023-12-21T01:15:20.367",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Win32k Information Disclosure Vulnerability." "value": "Win32k Information Disclosure Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21877", "id": "CVE-2022-21877",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.237", "published": "2022-01-11T21:15:11.237",
"lastModified": "2022-05-23T17:29:17.670", "lastModified": "2023-12-21T01:15:20.463",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Storage Spaces Controller Information Disclosure Vulnerability." "value": "Storage Spaces Controller Information Disclosure Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21878", "id": "CVE-2022-21878",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.290", "published": "2022-01-11T21:15:11.290",
"lastModified": "2022-05-23T17:29:17.680", "lastModified": "2023-12-21T01:15:20.563",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Geolocation Service Remote Code Execution Vulnerability." "value": "Windows Geolocation Service Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-94" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21879", "id": "CVE-2022-21879",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.343", "published": "2022-01-11T21:15:11.343",
"lastModified": "2022-05-23T17:29:17.693", "lastModified": "2023-12-21T01:15:20.683",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21881." "value": "Windows Kernel Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21880", "id": "CVE-2022-21880",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.400", "published": "2022-01-11T21:15:11.400",
"lastModified": "2022-05-23T17:29:17.710", "lastModified": "2023-12-21T01:15:20.787",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21915." "value": "Windows GDI+ Information Disclosure Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-668" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21881", "id": "CVE-2022-21881",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.453", "published": "2022-01-11T21:15:11.453",
"lastModified": "2022-08-19T10:56:26.280", "lastModified": "2023-12-21T01:15:20.893",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21879." "value": "Windows Kernel Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "CWE-362"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21882", "id": "CVE-2022-21882",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.507", "published": "2022-01-11T21:15:11.507",
"lastModified": "2022-05-23T17:29:17.750", "lastModified": "2023-12-21T01:15:21.003",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cisaExploitAdd": "2022-02-04", "cisaExploitAdd": "2022-02-04",
"cisaActionDue": "2022-02-18", "cisaActionDue": "2022-02-18",
"cisaRequiredAction": "Apply updates per vendor instructions.", "cisaRequiredAction": "Apply updates per vendor instructions.",
@ -11,7 +11,7 @@
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21887." "value": "Win32k Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -94,7 +94,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "CWE-787"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21883", "id": "CVE-2022-21883",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.560", "published": "2022-01-11T21:15:11.560",
"lastModified": "2022-05-23T17:29:17.767", "lastModified": "2023-12-21T01:15:21.110",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21889, CVE-2022-21890." "value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21884", "id": "CVE-2022-21884",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.640", "published": "2022-01-11T21:15:11.640",
"lastModified": "2022-05-23T17:29:17.787", "lastModified": "2023-12-21T01:15:21.210",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability." "value": "Local Security Authority Subsystem Service Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21885", "id": "CVE-2022-21885",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.693", "published": "2022-01-11T21:15:11.693",
"lastModified": "2022-05-23T17:29:17.797", "lastModified": "2023-12-21T01:15:21.293",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21914." "value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21887", "id": "CVE-2022-21887",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.747", "published": "2022-01-11T21:15:11.747",
"lastModified": "2022-01-19T16:58:49.477", "lastModified": "2023-12-21T01:15:21.390",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Win32k Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21882." "value": "Win32k Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21888", "id": "CVE-2022-21888",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.800", "published": "2022-01-11T21:15:11.800",
"lastModified": "2022-05-23T17:29:17.820", "lastModified": "2023-12-21T01:15:21.510",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Modern Execution Server Remote Code Execution Vulnerability." "value": "Windows Modern Execution Server Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21889", "id": "CVE-2022-21889",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.853", "published": "2022-01-11T21:15:11.853",
"lastModified": "2022-05-23T17:29:17.827", "lastModified": "2023-12-21T01:15:21.687",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21883, CVE-2022-21890." "value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21890", "id": "CVE-2022-21890",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.910", "published": "2022-01-11T21:15:11.910",
"lastModified": "2022-05-23T17:29:17.847", "lastModified": "2023-12-21T01:15:21.807",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows IKE Extension Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-21843, CVE-2022-21848, CVE-2022-21883, CVE-2022-21889." "value": "Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21891", "id": "CVE-2022-21891",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:11.963", "published": "2022-01-11T21:15:11.963",
"lastModified": "2022-01-19T14:15:39.413", "lastModified": "2023-12-21T01:15:21.927",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability." "value": "Microsoft Dynamics 365 (on-premises) Spoofing Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21892", "id": "CVE-2022-21892",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.017", "published": "2022-01-11T21:15:12.017",
"lastModified": "2022-05-23T17:29:17.867", "lastModified": "2023-12-21T01:15:22.040",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963." "value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21893", "id": "CVE-2022-21893",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.073", "published": "2022-01-11T21:15:12.073",
"lastModified": "2022-05-23T17:29:17.880", "lastModified": "2023-12-21T01:15:22.173",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Remote Desktop Protocol Remote Code Execution Vulnerability." "value": "Remote Desktop Protocol Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -17,7 +17,7 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "secure@microsoft.com",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -37,23 +37,23 @@
"impactScore": 5.9 "impactScore": 5.9
}, },
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "NONE", "privilegesRequired": "LOW",
"userInteraction": "REQUIRED", "userInteraction": "REQUIRED",
"scope": "UNCHANGED", "scope": "UNCHANGED",
"confidentialityImpact": "HIGH", "confidentialityImpact": "HIGH",
"integrityImpact": "HIGH", "integrityImpact": "HIGH",
"availabilityImpact": "HIGH", "availabilityImpact": "HIGH",
"baseScore": 8.8, "baseScore": 8.0,
"baseSeverity": "HIGH" "baseSeverity": "HIGH"
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.1,
"impactScore": 5.9 "impactScore": 5.9
} }
], ],

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21894", "id": "CVE-2022-21894",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.130", "published": "2022-01-11T21:15:12.130",
"lastModified": "2022-05-23T17:29:17.903", "lastModified": "2023-12-21T01:15:22.473",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Secure Boot Security Feature Bypass Vulnerability." "value": "Secure Boot Security Feature Bypass Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21895", "id": "CVE-2022-21895",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.187", "published": "2022-01-11T21:15:12.187",
"lastModified": "2022-05-23T17:29:17.920", "lastModified": "2023-12-21T01:15:22.610",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21919." "value": "Windows User Profile Service Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "CWE-59"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21896", "id": "CVE-2022-21896",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.243", "published": "2022-01-11T21:15:12.243",
"lastModified": "2022-05-23T17:29:17.937", "lastModified": "2023-12-21T01:15:22.823",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21902." "value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "CWE-362"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21897", "id": "CVE-2022-21897",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.300", "published": "2022-01-11T21:15:12.300",
"lastModified": "2022-05-23T17:29:17.947", "lastModified": "2023-12-21T01:15:23.017",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21916." "value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21898", "id": "CVE-2022-21898",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.357", "published": "2022-01-11T21:15:12.357",
"lastModified": "2022-05-23T17:29:17.977", "lastModified": "2023-12-21T01:15:23.140",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21912." "value": "DirectX Graphics Kernel Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21899", "id": "CVE-2022-21899",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.413", "published": "2022-01-11T21:15:12.413",
"lastModified": "2022-01-19T18:05:06.087", "lastModified": "2023-12-21T01:15:23.280",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Extensible Firmware Interface Security Feature Bypass Vulnerability." "value": "Windows Extensible Firmware Interface Security Feature Bypass Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-863" "value": "NVD-CWE-Other"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21900", "id": "CVE-2022-21900",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.473", "published": "2022-01-11T21:15:12.473",
"lastModified": "2022-05-23T17:29:17.987", "lastModified": "2023-12-21T01:15:23.387",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21905." "value": "Windows Hyper-V Security Feature Bypass Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21901", "id": "CVE-2022-21901",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.527", "published": "2022-01-11T21:15:12.527",
"lastModified": "2022-05-23T17:29:18.000", "lastModified": "2023-12-21T01:15:23.507",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Hyper-V Elevation of Privilege Vulnerability." "value": "Windows Hyper-V Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21902", "id": "CVE-2022-21902",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.580", "published": "2022-01-11T21:15:12.580",
"lastModified": "2022-05-23T17:29:18.013", "lastModified": "2023-12-21T01:15:23.663",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows DWM Core Library Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21852, CVE-2022-21896." "value": "Windows DWM Core Library Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21903", "id": "CVE-2022-21903",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.637", "published": "2022-01-11T21:15:12.637",
"lastModified": "2022-05-23T17:29:18.023", "lastModified": "2023-12-21T01:15:23.773",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows GDI Elevation of Privilege Vulnerability." "value": "Windows GDI Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21904", "id": "CVE-2022-21904",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.690", "published": "2022-01-11T21:15:12.690",
"lastModified": "2022-05-23T17:29:18.050", "lastModified": "2023-12-21T01:15:23.873",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows GDI Information Disclosure Vulnerability." "value": "Windows GDI Information Disclosure Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-668" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21905", "id": "CVE-2022-21905",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.750", "published": "2022-01-11T21:15:12.750",
"lastModified": "2022-05-23T17:29:18.110", "lastModified": "2023-12-21T01:15:23.990",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Hyper-V Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-21900." "value": "Windows Hyper-V Security Feature Bypass Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21906", "id": "CVE-2022-21906",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.807", "published": "2022-01-11T21:15:12.807",
"lastModified": "2022-09-27T20:33:07.713", "lastModified": "2023-12-21T01:15:24.107",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Defender Application Control Security Feature Bypass Vulnerability." "value": "Windows Defender Application Control Security Feature Bypass Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21907", "id": "CVE-2022-21907",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.863", "published": "2022-01-11T21:15:12.863",
"lastModified": "2022-08-26T17:46:15.957", "lastModified": "2023-12-21T01:15:24.233",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "HTTP Protocol Stack Remote Code Execution Vulnerability." "value": "HTTP Protocol Stack Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21908", "id": "CVE-2022-21908",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.917", "published": "2022-01-11T21:15:12.917",
"lastModified": "2022-05-23T17:29:18.273", "lastModified": "2023-12-21T01:15:24.357",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Installer Elevation of Privilege Vulnerability." "value": "Windows Installer Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21910", "id": "CVE-2022-21910",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:12.970", "published": "2022-01-11T21:15:12.970",
"lastModified": "2022-05-23T17:29:18.300", "lastModified": "2023-12-21T01:15:24.470",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Cluster Port Driver Elevation of Privilege Vulnerability." "value": "Microsoft Cluster Port Driver Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21911", "id": "CVE-2022-21911",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.027", "published": "2022-01-11T21:15:13.027",
"lastModified": "2022-05-23T17:29:18.310", "lastModified": "2023-12-21T01:15:24.580",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": ".NET Framework Denial of Service Vulnerability." "value": ".NET Framework Denial of Service Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21912", "id": "CVE-2022-21912",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.083", "published": "2022-01-11T21:15:13.083",
"lastModified": "2022-05-23T17:29:18.410", "lastModified": "2023-12-21T01:15:24.813",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "DirectX Graphics Kernel Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21898." "value": "DirectX Graphics Kernel Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21913", "id": "CVE-2022-21913",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.137", "published": "2022-01-11T21:15:13.137",
"lastModified": "2022-05-23T17:29:18.420", "lastModified": "2023-12-21T01:15:24.950",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass." "value": "Local Security Authority (Domain Policy) Remote Protocol Security Feature Bypass"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-863" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21914", "id": "CVE-2022-21914",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.197", "published": "2022-01-11T21:15:13.197",
"lastModified": "2022-05-23T17:29:18.447", "lastModified": "2023-12-21T01:15:25.090",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21885." "value": "Windows Remote Access Connection Manager Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21915", "id": "CVE-2022-21915",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.250", "published": "2022-01-11T21:15:13.250",
"lastModified": "2022-05-23T17:29:18.470", "lastModified": "2023-12-21T01:15:25.220",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows GDI+ Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21880." "value": "Windows GDI+ Information Disclosure Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-668" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21916", "id": "CVE-2022-21916",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.307", "published": "2022-01-11T21:15:13.307",
"lastModified": "2022-05-23T17:29:18.493", "lastModified": "2023-12-21T01:15:25.343",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21897." "value": "Windows Common Log File System Driver Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21917", "id": "CVE-2022-21917",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.360", "published": "2022-01-11T21:15:13.360",
"lastModified": "2022-04-01T14:30:07.997", "lastModified": "2023-12-21T01:15:25.470",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "HEVC Video Extensions Remote Code Execution Vulnerability." "value": "HEVC Video Extensions Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21918", "id": "CVE-2022-21918",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.410", "published": "2022-01-11T21:15:13.410",
"lastModified": "2022-05-23T17:29:18.517", "lastModified": "2023-12-21T01:15:25.640",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "DirectX Graphics Kernel File Denial of Service Vulnerability." "value": "DirectX Graphics Kernel File Denial of Service Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-400" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-21919", "id": "CVE-2022-21919",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.463", "published": "2022-01-11T21:15:13.463",
"lastModified": "2022-05-23T17:29:18.527", "lastModified": "2023-12-21T01:15:25.740",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cisaExploitAdd": "2022-04-25", "cisaExploitAdd": "2022-04-25",
"cisaActionDue": "2022-05-16", "cisaActionDue": "2022-05-16",
"cisaRequiredAction": "Apply updates per vendor instructions.", "cisaRequiredAction": "Apply updates per vendor instructions.",
@ -11,7 +11,7 @@
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows User Profile Service Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21895." "value": "Windows User Profile Service Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -74,7 +74,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "CWE-59"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21920", "id": "CVE-2022-21920",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.520", "published": "2022-01-11T21:15:13.520",
"lastModified": "2022-05-23T17:29:18.547", "lastModified": "2023-12-21T01:15:25.843",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Kerberos Elevation of Privilege Vulnerability." "value": "Windows Kerberos Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -17,7 +17,7 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "secure@microsoft.com",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -35,15 +35,13 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
} },
],
"cvssMetricV30": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",
@ -92,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21921", "id": "CVE-2022-21921",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.567", "published": "2022-01-11T21:15:13.567",
"lastModified": "2022-05-23T17:29:18.573", "lastModified": "2023-12-21T01:15:26.097",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability." "value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21922", "id": "CVE-2022-21922",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.623", "published": "2022-01-11T21:15:13.623",
"lastModified": "2022-05-23T17:29:18.587", "lastModified": "2023-12-21T01:15:26.220",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability." "value": "Remote Procedure Call Runtime Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -17,7 +17,7 @@
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{ {
"source": "nvd@nist.gov", "source": "secure@microsoft.com",
"type": "Primary", "type": "Primary",
"cvssData": { "cvssData": {
"version": "3.1", "version": "3.1",
@ -35,15 +35,13 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 5.9 "impactScore": 5.9
} },
],
"cvssMetricV30": [
{ {
"source": "secure@microsoft.com", "source": "nvd@nist.gov",
"type": "Secondary", "type": "Secondary",
"cvssData": { "cvssData": {
"version": "3.0", "version": "3.1",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK", "attackVector": "NETWORK",
"attackComplexity": "LOW", "attackComplexity": "LOW",
"privilegesRequired": "LOW", "privilegesRequired": "LOW",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21924", "id": "CVE-2022-21924",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.667", "published": "2022-01-11T21:15:13.667",
"lastModified": "2022-05-23T17:29:18.610", "lastModified": "2023-12-21T01:15:26.450",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Workstation Service Remote Protocol Security Feature Bypass Vulnerability." "value": "Workstation Service Remote Protocol Security Feature Bypass Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21925", "id": "CVE-2022-21925",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.723", "published": "2022-01-11T21:15:13.723",
"lastModified": "2022-01-21T17:32:21.970", "lastModified": "2023-12-21T01:15:26.577",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows BackupKey Remote Protocol Security Feature Bypass Vulnerability." "value": "Windows BackupKey Remote Protocol Security Feature Bypass Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21928", "id": "CVE-2022-21928",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.777", "published": "2022-01-11T21:15:13.777",
"lastModified": "2022-05-23T17:29:18.637", "lastModified": "2023-12-21T01:15:26.770",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963." "value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -90,7 +90,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-94" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21929", "id": "CVE-2022-21929",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.830", "published": "2022-01-11T21:15:13.830",
"lastModified": "2022-01-20T19:23:30.300", "lastModified": "2023-12-21T01:15:26.870",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21930, CVE-2022-21931." "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21930", "id": "CVE-2022-21930",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.887", "published": "2022-01-11T21:15:13.887",
"lastModified": "2022-01-20T19:35:50.767", "lastModified": "2023-12-21T01:15:26.990",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21929, CVE-2022-21931." "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21931", "id": "CVE-2022-21931",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.937", "published": "2022-01-11T21:15:13.937",
"lastModified": "2022-01-20T19:28:42.980", "lastModified": "2023-12-21T01:15:27.110",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21929, CVE-2022-21930." "value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21932", "id": "CVE-2022-21932",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:13.993", "published": "2022-01-11T21:15:13.993",
"lastModified": "2022-01-20T18:48:25.657", "lastModified": "2023-12-21T01:15:27.207",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability." "value": "Microsoft Dynamics 365 Customer Engagement Cross-Site Scripting Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21954", "id": "CVE-2022-21954",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.047", "published": "2022-01-11T21:15:14.047",
"lastModified": "2022-01-20T19:31:24.330", "lastModified": "2023-12-21T01:15:27.307",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-21970." "value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",
@ -70,7 +70,7 @@
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
"value": "CWE-269" "value": "NVD-CWE-noinfo"
} }
] ]
} }

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21957", "id": "CVE-2022-21957",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-02-09T17:15:08.480", "published": "2022-02-09T17:15:08.480",
"lastModified": "2023-06-29T05:15:09.773", "lastModified": "2023-12-21T01:15:27.397",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Microsoft Dynamics 365 (on-premises) Remote Code Execution Vulnerability" "value": "Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21958", "id": "CVE-2022-21958",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.100", "published": "2022-01-11T21:15:14.100",
"lastModified": "2022-05-23T17:29:18.650", "lastModified": "2023-12-21T01:15:27.537",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21959, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963." "value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21959", "id": "CVE-2022-21959",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.150", "published": "2022-01-11T21:15:14.150",
"lastModified": "2022-05-23T17:29:18.663", "lastModified": "2023-12-21T01:15:27.680",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21960, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963." "value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21960", "id": "CVE-2022-21960",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.203", "published": "2022-01-11T21:15:14.203",
"lastModified": "2022-05-23T17:29:18.677", "lastModified": "2023-12-21T01:15:27.813",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21961, CVE-2022-21962, CVE-2022-21963." "value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-21961", "id": "CVE-2022-21961",
"sourceIdentifier": "secure@microsoft.com", "sourceIdentifier": "secure@microsoft.com",
"published": "2022-01-11T21:15:14.260", "published": "2022-01-11T21:15:14.260",
"lastModified": "2022-05-23T17:29:18.690", "lastModified": "2023-12-21T01:15:27.917",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-21892, CVE-2022-21928, CVE-2022-21958, CVE-2022-21959, CVE-2022-21960, CVE-2022-21962, CVE-2022-21963." "value": "Windows Resilient File System (ReFS) Remote Code Execution Vulnerability"
}, },
{ {
"lang": "es", "lang": "es",

Some files were not shown because too many files have changed in this diff Show More