Auto-Update: 2023-05-31T20:00:27.942308+00:00

This commit is contained in:
cad-safe-bot 2023-05-31 20:00:31 +00:00
parent ef7b096aca
commit c347e38bee
152 changed files with 3091 additions and 1154 deletions

View File

@ -0,0 +1,92 @@
{
"id": "CVE-2015-10108",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-31T19:15:11.720",
"lastModified": "2023-05-31T19:15:11.720",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in meitar Inline Google Spreadsheet Viewer Plugin up to 0.9.6 on WordPress and classified as problematic. Affected by this issue is the function displayShortcode of the file inline-gdocs-viewer.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 0.9.6.1 is able to address this issue. The name of the patch is 2a8057df8ca30adc859cecbe5cad21ac28c5b747. It is recommended to upgrade the affected component. VDB-230234 is the identifier assigned to this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/wp-plugins/inline-google-spreadsheet-viewer/commit/2a8057df8ca30adc859cecbe5cad21ac28c5b747",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/wp-plugins/inline-google-spreadsheet-viewer/releases/tag/0.9.6.1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.230234",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.230234",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-0357",
"sourceIdentifier": "cve-requests@bitdefender.com",
"published": "2023-05-24T08:15:08.957",
"lastModified": "2023-05-24T12:59:09.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2023-05-31T19:29:13.683",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
@ -12,6 +12,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "cve-requests@bitdefender.com",
"type": "Secondary",
@ -46,10 +66,43 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitdefender:antivirus_plus:*:*:*:*:*:*:*:*",
"versionEndExcluding": "26.0.10.45",
"matchCriteriaId": "AF0B6471-635E-483D-9BC5-DBDD00C9B90C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitdefender:internet_security:*:*:*:*:*:*:*:*",
"versionEndExcluding": "26.0.10.45",
"matchCriteriaId": "CE68669B-FBEC-4060-B97A-845BA269B8ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
"versionEndExcluding": "26.0.10.45",
"matchCriteriaId": "02A583B6-D71B-4F97-AC44-362F8D1008FB"
}
]
}
]
}
],
"references": [
{
"url": "https://www.bitdefender.com/support/security-advisories/improper-quoting-path-issue-in-bitdefender-total-security",
"source": "cve-requests@bitdefender.com"
"source": "cve-requests@bitdefender.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-25743",
"sourceIdentifier": "product-security@qualcomm.com",
"published": "2022-11-15T10:15:15.300",
"lastModified": "2022-11-18T05:01:33.030",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:11.893",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
@ -5172,6 +5172,10 @@
}
],
"references": [
{
"url": "http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html",
"source": "product-security@qualcomm.com"
},
{
"url": "https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletin",
"source": "product-security@qualcomm.com",

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-30133",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:09.563",
"lastModified": "2022-08-11T22:23:15.747",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.203",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35744."
"value": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -149,12 +149,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30133",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30133",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-30134",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:09.623",
"lastModified": "2022-09-22T16:58:19.467",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.333",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21979, CVE-2022-34692."
"value": "Microsoft Exchange Server Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -16,29 +16,9 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "secure@microsoft.com",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
@ -55,6 +35,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -109,12 +109,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30134",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30134",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-30144",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:09.683",
"lastModified": "2022-08-11T22:01:53.393",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.427",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Bluetooth Service Remote Code Execution Vulnerability."
"value": "Windows Bluetooth Service Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -109,12 +109,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30144",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30144",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-30175",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:09.740",
"lastModified": "2022-08-11T22:01:21.263",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.507",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806."
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -69,12 +69,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30175",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30175",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-30176",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:09.797",
"lastModified": "2022-08-11T21:59:30.727",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.587",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806."
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -69,12 +69,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30176",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30176",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-30194",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:09.853",
"lastModified": "2022-08-11T22:22:28.317",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.657",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows WebBrowser Control Remote Code Execution Vulnerability."
"value": "Windows WebBrowser Control Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -154,12 +154,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30194",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30194",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-30197",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:09.917",
"lastModified": "2022-08-11T21:58:52.230",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.737",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34708."
"value": "Windows Kernel Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -104,12 +104,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30197",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30197",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33631",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:09.977",
"lastModified": "2022-08-11T21:58:33.937",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.810",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Security Feature Bypass Vulnerability."
"value": "Microsoft Excel Security Feature Bypass Vulnerability"
},
{
"lang": "es",
@ -94,12 +94,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33631",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33631",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33636",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.037",
"lastModified": "2022-08-30T12:36:04.153",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.887",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability."
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -70,19 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33636",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202208-35",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33636",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33640",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.097",
"lastModified": "2022-08-11T21:56:52.240",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:13.977",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability."
"value": "System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -85,12 +85,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33640",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33640",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33648",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.213",
"lastModified": "2022-08-11T21:39:20.300",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.057",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Excel Remote Code Execution Vulnerability."
"value": "Microsoft Excel Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -69,12 +69,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33648",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33648",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33649",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.267",
"lastModified": "2022-09-26T18:40:53.947",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.137",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability."
"value": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -37,7 +37,7 @@
"impactScore": 6.0
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -90,19 +90,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33649",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202208-35",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33649",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-33670",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.330",
"lastModified": "2022-08-11T21:36:49.837",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.220",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34703."
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -139,12 +139,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33670",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33670",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34687",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.500",
"lastModified": "2022-08-12T18:39:02.160",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.303",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806."
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -69,12 +69,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34687",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34687",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34690",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.560",
"lastModified": "2022-08-12T18:50:32.593",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.393",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Fax Service Elevation of Privilege Vulnerability."
"value": "Windows Fax Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -154,12 +154,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34690",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34690",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34691",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.617",
"lastModified": "2022-08-12T19:14:36.607",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.487",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability."
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -154,12 +154,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34691",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34692",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.673",
"lastModified": "2022-08-12T19:17:51.297",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.570",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21979, CVE-2022-30134."
"value": "Microsoft Exchange Server Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -84,12 +84,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34692",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34692",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34696",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.730",
"lastModified": "2022-08-12T19:50:41.427",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.650",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Remote Code Execution Vulnerability."
"value": "Windows Hyper-V Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -129,12 +129,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34696",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34696",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34699",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.787",
"lastModified": "2022-08-12T19:53:29.677",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.733",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Win32k Elevation of Privilege Vulnerability."
"value": "Windows Win32k Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -124,12 +124,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34699",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34699",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34701",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.847",
"lastModified": "2022-10-28T19:16:57.580",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.807",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability."
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability"
},
{
"lang": "es",
@ -179,12 +179,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34701",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34701",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34702",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.910",
"lastModified": "2022-08-12T20:07:04.463",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.883",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794."
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -159,12 +159,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34702",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34702",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34703",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:10.967",
"lastModified": "2022-08-12T20:17:55.073",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:14.957",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-33670."
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -124,12 +124,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34703",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34703",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34704",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.027",
"lastModified": "2023-02-16T02:29:13.067",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.037",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34710, CVE-2022-34712."
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -144,20 +144,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168329/Windows-Credential-Guard-Non-Constant-Time-Comparison-Information-Disclosure.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34704",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34704",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34705",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.083",
"lastModified": "2022-09-16T20:13:01.227",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.133",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35771."
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -109,20 +109,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168315/Windows-Credential-Guard-BCrypt-Context-Use-After-Free-Privilege-Escalation.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34705",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34705",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34706",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.140",
"lastModified": "2022-08-12T16:18:23.387",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.213",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability."
"value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -159,12 +159,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34706",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34706",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34707",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.203",
"lastModified": "2022-09-16T20:12:13.267",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.287",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35761, CVE-2022-35768."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -159,20 +159,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168311/Windows-Kernel-Refcount-Overflow-Use-After-Free.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34707",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34707",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34708",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.260",
"lastModified": "2022-09-16T20:13:50.507",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.367",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-30197."
"value": "Windows Kernel Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -159,20 +159,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168312/Windows-Kernel-Unchecked-Blink-Cell-Index-Invalid-Read-Write.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34708",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34708",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34709",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.317",
"lastModified": "2022-10-07T18:10:17.657",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.447",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability."
"value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -37,7 +37,7 @@
"impactScore": 5.2
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -144,20 +144,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168314/Windows-Credential-Guard-ASN1-Decoder-Type-Confusion-Privilege-Escalation.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34709",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34709",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34710",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.377",
"lastModified": "2022-09-16T20:17:19.777",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.533",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34712."
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -174,20 +174,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168318/Windows-Credential-Guard-Insufficient-Checks-On-Kerberos-Encryption-Type-Use.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34710",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34710",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34711",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-15T21:15:08.037",
"lastModified": "2022-10-27T15:05:15.167",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.617",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34705, CVE-2022-35771."
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -124,20 +124,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168325/Windows-Credential-Guard-KerbIumCreateApReqAuthenticator-Key-Information-Disclosure.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34711",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34711",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34712",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.433",
"lastModified": "2022-09-16T20:08:47.707",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.710",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34710."
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability"
},
{
"lang": "es",
@ -129,20 +129,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168326/Windows-Credential-Guard-KerbIumGetNtlmSupplementalCredential-Information-Disclosure.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34712",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34712",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-34713",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.487",
"lastModified": "2022-08-12T17:32:22.720",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.797",
"vulnStatus": "Modified",
"cisaExploitAdd": "2022-08-09",
"cisaActionDue": "2022-08-30",
"cisaRequiredAction": "Apply updates per vendor instructions.",
@ -11,7 +11,7 @@
"descriptions": [
{
"lang": "en",
"value": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35743."
"value": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -218,12 +218,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34713",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34714",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.547",
"lastModified": "2022-08-12T17:23:55.687",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.880",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794."
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -224,12 +224,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34714",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34714",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34715",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.600",
"lastModified": "2022-08-12T17:30:24.140",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:15.957",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Network File System Remote Code Execution Vulnerability."
"value": "Windows Network File System Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -69,13 +69,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34715",
"source": "secure@microsoft.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34715",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34716",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.660",
"lastModified": "2022-09-16T20:17:23.583",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:16.030",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": ".NET Spoofing Vulnerability."
"value": ".NET Spoofing Vulnerability"
},
{
"lang": "es",
@ -92,20 +92,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168332/.NET-XML-Signature-Verification-External-Entity-Injection.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34716",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34716",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-34717",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.720",
"lastModified": "2022-08-12T17:22:23.320",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:16.113",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Office Remote Code Execution Vulnerability."
"value": "Microsoft Office Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -119,12 +119,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34717",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34717",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35743",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.203",
"lastModified": "2023-05-31T19:15:16.203",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35743",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35744",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.273",
"lastModified": "2023-05-31T19:15:16.273",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35745",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.367",
"lastModified": "2023-05-31T19:15:16.367",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35745",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35746",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.427",
"lastModified": "2023-05-31T19:15:16.427",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Digital Media Receiver Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35746",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35747",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.490",
"lastModified": "2023-05-31T19:15:16.490",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35747",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35748",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.550",
"lastModified": "2023-05-31T19:15:16.550",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "HTTP.sys Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35748",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35749",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.610",
"lastModified": "2023-05-31T19:15:16.610",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Digital Media Receiver Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35749",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35750",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.677",
"lastModified": "2023-05-31T19:15:16.677",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Win32k Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35751",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.747",
"lastModified": "2023-05-31T19:15:16.747",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Hyper-V Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.1,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35752",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.813",
"lastModified": "2023-05-31T19:15:16.813",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35752",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35753",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.877",
"lastModified": "2023-05-31T19:15:16.877",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35753",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35754",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:16.937",
"lastModified": "2023-05-31T19:15:16.937",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Unified Write Filter Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35754",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35755",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:17.000",
"lastModified": "2023-05-31T19:15:17.000",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35755",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35756",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:17.063",
"lastModified": "2023-05-31T19:15:17.063",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Kerberos Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35756",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35757",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:17.123",
"lastModified": "2023-05-31T19:15:17.123",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35757",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35758",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:17.190",
"lastModified": "2023-05-31T19:15:17.190",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Memory Information Disclosure Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35758",
"source": "secure@microsoft.com"
}
]
}

View File

@ -0,0 +1,43 @@
{
"id": "CVE-2022-35759",
"sourceIdentifier": "secure@microsoft.com",
"published": "2023-05-31T19:15:17.253",
"lastModified": "2023-05-31T19:15:17.253",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "Windows Local Security Authority (LSA) Denial of Service Vulnerability"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35759",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35760",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.777",
"lastModified": "2022-08-12T17:21:15.637",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:17.317",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft ATA Port Driver Elevation of Privilege Vulnerability."
"value": "Microsoft ATA Port Driver Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -214,12 +214,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35760",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35760",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35761",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.833",
"lastModified": "2022-09-27T17:31:54.647",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:17.407",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34707, CVE-2022-35768."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -184,12 +184,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35761",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35761",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35762",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.890",
"lastModified": "2022-08-12T17:15:34.457",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:17.493",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35763, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792."
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -154,12 +154,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35762",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35762",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35763",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:11.947",
"lastModified": "2022-08-12T17:14:47.457",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:17.570",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792."
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -154,12 +154,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35763",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35763",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35764",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.010",
"lastModified": "2022-08-12T17:12:39.410",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:17.657",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35765, CVE-2022-35792."
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -154,12 +154,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35764",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35764",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35765",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.067",
"lastModified": "2022-08-12T17:09:27.963",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:17.740",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35764, CVE-2022-35792."
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -154,12 +154,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35765",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35765",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35766",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.120",
"lastModified": "2022-08-12T17:07:34.157",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:17.820",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35767, CVE-2022-35794."
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -149,12 +149,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35766",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35766",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35767",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.177",
"lastModified": "2022-08-12T16:29:40.163",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:17.910",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35794."
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -224,12 +224,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35767",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35767",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35768",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.233",
"lastModified": "2022-09-16T20:17:27.860",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:17.997",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34707, CVE-2022-35761."
"value": "Windows Kernel Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -224,20 +224,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168313/Windows-Kernel-Registry-Hive-Memory-Problems.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35768",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35768",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35769",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.293",
"lastModified": "2022-08-12T16:23:27.657",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.097",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-35747."
"value": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability"
},
{
"lang": "es",
@ -224,12 +224,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35769",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35769",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35771",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.350",
"lastModified": "2022-09-16T20:17:31.410",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.193",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34705."
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -174,20 +174,8 @@
],
"references": [
{
"url": "http://packetstormsecurity.com/files/168319/Windows-Credential-Guard-Kerberos-Change-Password-Privilege-Escalation.html",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35771",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35771",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35772",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.410",
"lastModified": "2022-08-12T16:15:08.947",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.283",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35824."
"value": "Azure Site Recovery Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35772",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35772",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35773",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.473",
"lastModified": "2022-08-12T16:11:22.313",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35779, CVE-2022-35806."
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -69,12 +69,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35773",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35773",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35774",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.533",
"lastModified": "2022-08-12T16:06:29.380",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.450",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35774",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35774",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35775",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.587",
"lastModified": "2022-08-12T16:05:34.227",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.530",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35775",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35775",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35776",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.643",
"lastModified": "2022-08-12T16:14:36.190",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.613",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Denial of Service Vulnerability."
"value": "Azure Site Recovery Denial of Service Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35776",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35776",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35777",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.703",
"lastModified": "2022-08-12T16:13:04.690",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.707",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35825, CVE-2022-35826, CVE-2022-35827."
"value": "Visual Studio Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -103,12 +103,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35777",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35777",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35779",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.757",
"lastModified": "2022-08-12T16:10:14.973",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.797",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35806."
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -69,12 +69,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35779",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35779",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35780",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.817",
"lastModified": "2022-08-12T16:04:36.850",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.880",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35780",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35780",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35781",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.870",
"lastModified": "2022-08-12T16:04:13.793",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:18.967",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35781",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35781",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35782",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.930",
"lastModified": "2022-08-12T16:03:47.033",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.047",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35782",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35782",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35783",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:12.990",
"lastModified": "2022-08-12T16:02:56.537",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.147",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35783",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35783",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35784",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.047",
"lastModified": "2022-08-12T16:02:25.383",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.237",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35784",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35784",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35785",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.103",
"lastModified": "2022-08-12T16:01:42.413",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.327",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35785",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35785",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35786",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.160",
"lastModified": "2022-08-12T16:01:13.637",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.413",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35786",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35786",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35787",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.227",
"lastModified": "2022-08-12T16:00:35.143",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.510",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35787",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35787",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35788",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.277",
"lastModified": "2022-08-12T16:00:04.880",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.597",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35788",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35788",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35789",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.340",
"lastModified": "2022-08-12T15:59:32.393",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.673",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35789",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35789",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35790",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.410",
"lastModified": "2022-08-12T15:59:01.053",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.767",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35790",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35790",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35791",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.477",
"lastModified": "2022-08-12T15:58:08.727",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.863",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35791",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35791",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35792",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.540",
"lastModified": "2022-08-16T00:09:52.107",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:19.973",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35764, CVE-2022-35765."
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -164,12 +164,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35792",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35792",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35793",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.597",
"lastModified": "2022-08-16T00:11:04.447",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:20.070",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35755."
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -224,13 +224,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35793",
"source": "secure@microsoft.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35793",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35794",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.650",
"lastModified": "2022-08-15T16:22:33.770",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:20.167",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767."
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -149,12 +149,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35794",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35794",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35795",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.707",
"lastModified": "2022-08-15T15:52:51.410",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:20.277",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Error Reporting Service Elevation of Privilege Vulnerability."
"value": "Windows Error Reporting Service Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -214,12 +214,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35795",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35795",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35796",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.767",
"lastModified": "2022-08-30T12:36:27.113",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:20.370",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability."
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,19 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35796",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202208-35",
"source": "secure@microsoft.com",
"tags": [
"Third Party Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35796",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35797",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.823",
"lastModified": "2022-08-15T15:16:46.807",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:20.533",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Windows Hello Security Feature Bypass Vulnerability."
"value": "Windows Hello Security Feature Bypass Vulnerability"
},
{
"lang": "es",
@ -134,12 +134,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35797",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35797",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35799",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.883",
"lastModified": "2022-08-12T16:27:05.737",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:20.627",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35799",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35799",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35800",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.937",
"lastModified": "2022-08-12T16:26:48.170",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:20.723",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35800",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35800",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35801",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:13.993",
"lastModified": "2022-08-12T16:26:19.610",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:20.823",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35801",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35801",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35802",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:14.093",
"lastModified": "2022-08-12T16:28:55.940",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:20.913",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -17,7 +17,7 @@
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"source": "secure@microsoft.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -37,7 +37,7 @@
"impactScore": 5.2
},
{
"source": "secure@microsoft.com",
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
@ -90,12 +90,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35802",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35802",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35804",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:14.163",
"lastModified": "2022-08-15T15:02:38.903",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:21.007",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "SMB Client and Server Remote Code Execution Vulnerability."
"value": "SMB Client and Server Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -74,13 +74,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35804",
"source": "secure@microsoft.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35804",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35806",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:14.217",
"lastModified": "2022-08-15T13:58:58.493",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:21.103",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779."
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
},
{
"lang": "es",
@ -69,12 +69,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35806",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35806",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35807",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:14.273",
"lastModified": "2022-08-12T16:08:18.423",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:21.190",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35807",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35807",
"source": "secure@microsoft.com"
}
]
}

View File

@ -2,12 +2,12 @@
"id": "CVE-2022-35808",
"sourceIdentifier": "secure@microsoft.com",
"published": "2022-08-09T20:15:14.333",
"lastModified": "2022-08-12T16:08:00.553",
"vulnStatus": "Analyzed",
"lastModified": "2023-05-31T19:15:21.297",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
},
{
"lang": "es",
@ -70,12 +70,8 @@
],
"references": [
{
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35808",
"source": "secure@microsoft.com",
"tags": [
"Patch",
"Vendor Advisory"
]
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35808",
"source": "secure@microsoft.com"
}
]
}

Some files were not shown because too many files have changed in this diff Show More