mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2023-05-31T20:00:27.942308+00:00
This commit is contained in:
parent
ef7b096aca
commit
c347e38bee
92
CVE-2015/CVE-2015-101xx/CVE-2015-10108.json
Normal file
92
CVE-2015/CVE-2015-101xx/CVE-2015-10108.json
Normal file
@ -0,0 +1,92 @@
|
||||
{
|
||||
"id": "CVE-2015-10108",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-31T19:15:11.720",
|
||||
"lastModified": "2023-05-31T19:15:11.720",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in meitar Inline Google Spreadsheet Viewer Plugin up to 0.9.6 on WordPress and classified as problematic. Affected by this issue is the function displayShortcode of the file inline-gdocs-viewer.php. The manipulation leads to cross-site request forgery. The attack may be launched remotely. Upgrading to version 0.9.6.1 is able to address this issue. The name of the patch is 2a8057df8ca30adc859cecbe5cad21ac28c5b747. It is recommended to upgrade the affected component. VDB-230234 is the identifier assigned to this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.0",
|
||||
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.0
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wp-plugins/inline-google-spreadsheet-viewer/commit/2a8057df8ca30adc859cecbe5cad21ac28c5b747",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wp-plugins/inline-google-spreadsheet-viewer/releases/tag/0.9.6.1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.230234",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.230234",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-0357",
|
||||
"sourceIdentifier": "cve-requests@bitdefender.com",
|
||||
"published": "2023-05-24T08:15:08.957",
|
||||
"lastModified": "2023-05-24T12:59:09.197",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2023-05-31T19:29:13.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -12,6 +12,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"type": "Secondary",
|
||||
@ -46,10 +66,43 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bitdefender:antivirus_plus:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "26.0.10.45",
|
||||
"matchCriteriaId": "AF0B6471-635E-483D-9BC5-DBDD00C9B90C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bitdefender:internet_security:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "26.0.10.45",
|
||||
"matchCriteriaId": "CE68669B-FBEC-4060-B97A-845BA269B8ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bitdefender:total_security:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "26.0.10.45",
|
||||
"matchCriteriaId": "02A583B6-D71B-4F97-AC44-362F8D1008FB"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.bitdefender.com/support/security-advisories/improper-quoting-path-issue-in-bitdefender-total-security",
|
||||
"source": "cve-requests@bitdefender.com"
|
||||
"source": "cve-requests@bitdefender.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-25743",
|
||||
"sourceIdentifier": "product-security@qualcomm.com",
|
||||
"published": "2022-11-15T10:15:15.300",
|
||||
"lastModified": "2022-11-18T05:01:33.030",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:11.893",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -5172,6 +5172,10 @@
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/172663/Qualcomm-Adreno-KGSL-Unchecked-Cast-Type-Confusion.html",
|
||||
"source": "product-security@qualcomm.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.qualcomm.com/company/product-security/bulletins/november-2022-bulletin",
|
||||
"source": "product-security@qualcomm.com",
|
||||
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-30133",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:09.563",
|
||||
"lastModified": "2022-08-11T22:23:15.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.203",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35744."
|
||||
"value": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -149,12 +149,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30133",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30133",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-30134",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:09.623",
|
||||
"lastModified": "2022-09-22T16:58:19.467",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.333",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21979, CVE-2022-34692."
|
||||
"value": "Microsoft Exchange Server Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -16,29 +16,9 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -55,6 +35,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -109,12 +109,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30134",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30134",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-30144",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:09.683",
|
||||
"lastModified": "2022-08-11T22:01:53.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.427",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Bluetooth Service Remote Code Execution Vulnerability."
|
||||
"value": "Windows Bluetooth Service Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -109,12 +109,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30144",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30144",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-30175",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:09.740",
|
||||
"lastModified": "2022-08-11T22:01:21.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.507",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806."
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -69,12 +69,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30175",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30175",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-30176",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:09.797",
|
||||
"lastModified": "2022-08-11T21:59:30.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.587",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806."
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -69,12 +69,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30176",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30176",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-30194",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:09.853",
|
||||
"lastModified": "2022-08-11T22:22:28.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.657",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows WebBrowser Control Remote Code Execution Vulnerability."
|
||||
"value": "Windows WebBrowser Control Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -154,12 +154,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30194",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30194",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-30197",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:09.917",
|
||||
"lastModified": "2022-08-11T21:58:52.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.737",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34708."
|
||||
"value": "Windows Kernel Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -104,12 +104,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30197",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30197",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33631",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:09.977",
|
||||
"lastModified": "2022-08-11T21:58:33.937",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.810",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Excel Security Feature Bypass Vulnerability."
|
||||
"value": "Microsoft Excel Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -94,12 +94,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33631",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33631",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33636",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.037",
|
||||
"lastModified": "2022-08-30T12:36:04.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.887",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,19 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33636",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202208-35",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33636",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33640",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.097",
|
||||
"lastModified": "2022-08-11T21:56:52.240",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:13.977",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability."
|
||||
"value": "System Center Operations Manager: Open Management Infrastructure (OMI) Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -85,12 +85,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33640",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33640",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33648",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.213",
|
||||
"lastModified": "2022-08-11T21:39:20.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.057",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Excel Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Excel Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -69,12 +69,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33648",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33648",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33649",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.267",
|
||||
"lastModified": "2022-09-26T18:40:53.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.137",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability."
|
||||
"value": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -37,7 +37,7 @@
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -90,19 +90,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33649",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202208-35",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33649",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-33670",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.330",
|
||||
"lastModified": "2022-08-11T21:36:49.837",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.220",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34703."
|
||||
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -139,12 +139,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-33670",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-33670",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34687",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.500",
|
||||
"lastModified": "2022-08-12T18:39:02.160",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.303",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-35773, CVE-2022-35779, CVE-2022-35806."
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -69,12 +69,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34687",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34687",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34690",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.560",
|
||||
"lastModified": "2022-08-12T18:50:32.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.393",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Fax Service Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Fax Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -154,12 +154,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34690",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34690",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34691",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.617",
|
||||
"lastModified": "2022-08-12T19:14:36.607",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.487",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability."
|
||||
"value": "Active Directory Domain Services Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -154,12 +154,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34691",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34691",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34692",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.673",
|
||||
"lastModified": "2022-08-12T19:17:51.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.570",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Exchange Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-21979, CVE-2022-30134."
|
||||
"value": "Microsoft Exchange Server Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -84,12 +84,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34692",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34692",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34696",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.730",
|
||||
"lastModified": "2022-08-12T19:50:41.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.650",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hyper-V Remote Code Execution Vulnerability."
|
||||
"value": "Windows Hyper-V Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -129,12 +129,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34696",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34696",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34699",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.787",
|
||||
"lastModified": "2022-08-12T19:53:29.677",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.733",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Win32k Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Win32k Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -124,12 +124,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34699",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34699",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34701",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.847",
|
||||
"lastModified": "2022-10-28T19:16:57.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.807",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability."
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -179,12 +179,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34701",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34701",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34702",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.910",
|
||||
"lastModified": "2022-08-12T20:07:04.463",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.883",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794."
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -159,12 +159,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34702",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34702",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34703",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:10.967",
|
||||
"lastModified": "2022-08-12T20:17:55.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:14.957",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-33670."
|
||||
"value": "Windows Partition Management Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -124,12 +124,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34703",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34703",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34704",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.027",
|
||||
"lastModified": "2023-02-16T02:29:13.067",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.037",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34710, CVE-2022-34712."
|
||||
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -144,20 +144,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168329/Windows-Credential-Guard-Non-Constant-Time-Comparison-Information-Disclosure.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34704",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34704",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34705",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.083",
|
||||
"lastModified": "2022-09-16T20:13:01.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.133",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35771."
|
||||
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -109,20 +109,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168315/Windows-Credential-Guard-BCrypt-Context-Use-After-Free-Privilege-Escalation.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34705",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34705",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34706",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.140",
|
||||
"lastModified": "2022-08-12T16:18:23.387",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.213",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -159,12 +159,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34706",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34706",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34707",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.203",
|
||||
"lastModified": "2022-09-16T20:12:13.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.287",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35761, CVE-2022-35768."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -159,20 +159,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168311/Windows-Kernel-Refcount-Overflow-Use-After-Free.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34707",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34707",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34708",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.260",
|
||||
"lastModified": "2022-09-16T20:13:50.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.367",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-30197."
|
||||
"value": "Windows Kernel Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -159,20 +159,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168312/Windows-Kernel-Unchecked-Blink-Cell-Index-Invalid-Read-Write.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34708",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34708",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34709",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.317",
|
||||
"lastModified": "2022-10-07T18:10:17.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.447",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability."
|
||||
"value": "Windows Defender Credential Guard Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -37,7 +37,7 @@
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -144,20 +144,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168314/Windows-Credential-Guard-ASN1-Decoder-Type-Confusion-Privilege-Escalation.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34709",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34709",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34710",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.377",
|
||||
"lastModified": "2022-09-16T20:17:19.777",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.533",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34712."
|
||||
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -174,20 +174,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168318/Windows-Credential-Guard-Insufficient-Checks-On-Kerberos-Encryption-Type-Use.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34710",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34710",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34711",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-15T21:15:08.037",
|
||||
"lastModified": "2022-10-27T15:05:15.167",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.617",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34705, CVE-2022-35771."
|
||||
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -124,20 +124,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168325/Windows-Credential-Guard-KerbIumCreateApReqAuthenticator-Key-Information-Disclosure.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34711",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34711",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34712",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.433",
|
||||
"lastModified": "2022-09-16T20:08:47.707",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.710",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-34704, CVE-2022-34710."
|
||||
"value": "Windows Defender Credential Guard Information Disclosure Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -129,20 +129,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168326/Windows-Credential-Guard-KerbIumGetNtlmSupplementalCredential-Information-Disclosure.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34712",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34712",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2022-34713",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.487",
|
||||
"lastModified": "2022-08-12T17:32:22.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.797",
|
||||
"vulnStatus": "Modified",
|
||||
"cisaExploitAdd": "2022-08-09",
|
||||
"cisaActionDue": "2022-08-30",
|
||||
"cisaRequiredAction": "Apply updates per vendor instructions.",
|
||||
@ -11,7 +11,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35743."
|
||||
"value": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -218,12 +218,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34713",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34713",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34714",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.547",
|
||||
"lastModified": "2022-08-12T17:23:55.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.880",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767, CVE-2022-35794."
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -224,12 +224,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34714",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34714",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34715",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.600",
|
||||
"lastModified": "2022-08-12T17:30:24.140",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:15.957",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Network File System Remote Code Execution Vulnerability."
|
||||
"value": "Windows Network File System Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -69,13 +69,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34715",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34715",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34716",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.660",
|
||||
"lastModified": "2022-09-16T20:17:23.583",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:16.030",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ".NET Spoofing Vulnerability."
|
||||
"value": ".NET Spoofing Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -92,20 +92,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168332/.NET-XML-Signature-Verification-External-Entity-Injection.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34716",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34716",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-34717",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.720",
|
||||
"lastModified": "2022-08-12T17:22:23.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:16.113",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Office Remote Code Execution Vulnerability."
|
||||
"value": "Microsoft Office Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -119,12 +119,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-34717",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34717",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35743.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35743.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35743",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.203",
|
||||
"lastModified": "2023-05-31T19:15:16.203",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35743",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35744.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35744.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35744",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.273",
|
||||
"lastModified": "2023-05-31T19:15:16.273",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Protocol (PPP) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35744",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35745.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35745.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35745",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.367",
|
||||
"lastModified": "2023-05-31T19:15:16.367",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35745",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35746.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35746.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35746",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.427",
|
||||
"lastModified": "2023-05-31T19:15:16.427",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Digital Media Receiver Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35746",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35747.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35747.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35747",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.490",
|
||||
"lastModified": "2023-05-31T19:15:16.490",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35747",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35748.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35748.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35748",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.550",
|
||||
"lastModified": "2023-05-31T19:15:16.550",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HTTP.sys Denial of Service Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35748",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35749.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35749.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35749",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.610",
|
||||
"lastModified": "2023-05-31T19:15:16.610",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Digital Media Receiver Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35749",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35750.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35750.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35750",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.677",
|
||||
"lastModified": "2023-05-31T19:15:16.677",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Win32k Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35750",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35751.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35751.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35751",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.747",
|
||||
"lastModified": "2023-05-31T19:15:16.747",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hyper-V Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35751",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35752.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35752.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35752",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.813",
|
||||
"lastModified": "2023-05-31T19:15:16.813",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35752",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35753.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35753.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35753",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.877",
|
||||
"lastModified": "2023-05-31T19:15:16.877",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35753",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35754.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35754.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35754",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:16.937",
|
||||
"lastModified": "2023-05-31T19:15:16.937",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Unified Write Filter Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35754",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35755.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35755.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35755",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:17.000",
|
||||
"lastModified": "2023-05-31T19:15:17.000",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35755",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35756.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35756.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35756",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:17.063",
|
||||
"lastModified": "2023-05-31T19:15:17.063",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kerberos Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35756",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35757.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35757.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35757",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:17.123",
|
||||
"lastModified": "2023-05-31T19:15:17.123",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35757",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35758.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35758.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35758",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:17.190",
|
||||
"lastModified": "2023-05-31T19:15:17.190",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Memory Information Disclosure Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35758",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
43
CVE-2022/CVE-2022-357xx/CVE-2022-35759.json
Normal file
43
CVE-2022/CVE-2022-357xx/CVE-2022-35759.json
Normal file
@ -0,0 +1,43 @@
|
||||
{
|
||||
"id": "CVE-2022-35759",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2023-05-31T19:15:17.253",
|
||||
"lastModified": "2023-05-31T19:15:17.253",
|
||||
"vulnStatus": "Received",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Local Security Authority (LSA) Denial of Service Vulnerability"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35759",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35760",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.777",
|
||||
"lastModified": "2022-08-12T17:21:15.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:17.317",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft ATA Port Driver Elevation of Privilege Vulnerability."
|
||||
"value": "Microsoft ATA Port Driver Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -214,12 +214,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35760",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35760",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35761",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.833",
|
||||
"lastModified": "2022-09-27T17:31:54.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:17.407",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34707, CVE-2022-35768."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -184,12 +184,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35761",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35761",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35762",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.890",
|
||||
"lastModified": "2022-08-12T17:15:34.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:17.493",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35763, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792."
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -154,12 +154,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35762",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35762",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35763",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:11.947",
|
||||
"lastModified": "2022-08-12T17:14:47.457",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:17.570",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35764, CVE-2022-35765, CVE-2022-35792."
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -154,12 +154,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35763",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35763",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35764",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.010",
|
||||
"lastModified": "2022-08-12T17:12:39.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:17.657",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35765, CVE-2022-35792."
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -154,12 +154,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35764",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35764",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35765",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.067",
|
||||
"lastModified": "2022-08-12T17:09:27.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:17.740",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35764, CVE-2022-35792."
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -154,12 +154,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35765",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35765",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35766",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.120",
|
||||
"lastModified": "2022-08-12T17:07:34.157",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:17.820",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35767, CVE-2022-35794."
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -149,12 +149,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35766",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35766",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35767",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.177",
|
||||
"lastModified": "2022-08-12T16:29:40.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:17.910",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35794."
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -224,12 +224,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35767",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35767",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35768",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.233",
|
||||
"lastModified": "2022-09-16T20:17:27.860",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:17.997",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34707, CVE-2022-35761."
|
||||
"value": "Windows Kernel Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -224,20 +224,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168313/Windows-Kernel-Registry-Hive-Memory-Problems.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35768",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35768",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35769",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.293",
|
||||
"lastModified": "2022-08-12T16:23:27.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.097",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability. This CVE ID is unique from CVE-2022-35747."
|
||||
"value": "Windows Point-to-Point Protocol (PPP) Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -224,12 +224,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35769",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35769",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35771",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.350",
|
||||
"lastModified": "2022-09-16T20:17:31.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.193",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-34705."
|
||||
"value": "Windows Defender Credential Guard Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -174,20 +174,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://packetstormsecurity.com/files/168319/Windows-Credential-Guard-Kerberos-Change-Password-Privilege-Escalation.html",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35771",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35771",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35772",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.410",
|
||||
"lastModified": "2022-08-12T16:15:08.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.283",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35824."
|
||||
"value": "Azure Site Recovery Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35772",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35772",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35773",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.473",
|
||||
"lastModified": "2022-08-12T16:11:22.313",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.370",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35779, CVE-2022-35806."
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -69,12 +69,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35773",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35773",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35774",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.533",
|
||||
"lastModified": "2022-08-12T16:06:29.380",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.450",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35774",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35774",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35775",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.587",
|
||||
"lastModified": "2022-08-12T16:05:34.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.530",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35775",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35775",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35776",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.643",
|
||||
"lastModified": "2022-08-12T16:14:36.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.613",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Denial of Service Vulnerability."
|
||||
"value": "Azure Site Recovery Denial of Service Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35776",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35776",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35777",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.703",
|
||||
"lastModified": "2022-08-12T16:13:04.690",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.707",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Visual Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-35825, CVE-2022-35826, CVE-2022-35827."
|
||||
"value": "Visual Studio Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -103,12 +103,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35777",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35777",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35779",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.757",
|
||||
"lastModified": "2022-08-12T16:10:14.973",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.797",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35806."
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -69,12 +69,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35779",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35779",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35780",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.817",
|
||||
"lastModified": "2022-08-12T16:04:36.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.880",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35780",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35780",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35781",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.870",
|
||||
"lastModified": "2022-08-12T16:04:13.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:18.967",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35781",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35781",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35782",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.930",
|
||||
"lastModified": "2022-08-12T16:03:47.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.047",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35782",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35782",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35783",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:12.990",
|
||||
"lastModified": "2022-08-12T16:02:56.537",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.147",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35783",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35783",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35784",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.047",
|
||||
"lastModified": "2022-08-12T16:02:25.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.237",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35784",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35784",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35785",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.103",
|
||||
"lastModified": "2022-08-12T16:01:42.413",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.327",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35785",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35785",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35786",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.160",
|
||||
"lastModified": "2022-08-12T16:01:13.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.413",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35786",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35786",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35787",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.227",
|
||||
"lastModified": "2022-08-12T16:00:35.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.510",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35787",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35787",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35788",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.277",
|
||||
"lastModified": "2022-08-12T16:00:04.880",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.597",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35788",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35788",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35789",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.340",
|
||||
"lastModified": "2022-08-12T15:59:32.393",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.673",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35789",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35789",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35790",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.410",
|
||||
"lastModified": "2022-08-12T15:59:01.053",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.767",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35790",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35790",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35791",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.477",
|
||||
"lastModified": "2022-08-12T15:58:08.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.863",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35791",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35791",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35792",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.540",
|
||||
"lastModified": "2022-08-16T00:09:52.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:19.973",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35762, CVE-2022-35763, CVE-2022-35764, CVE-2022-35765."
|
||||
"value": "Storage Spaces Direct Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -164,12 +164,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35792",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35792",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35793",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.597",
|
||||
"lastModified": "2022-08-16T00:11:04.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:20.070",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Print Spooler Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35755."
|
||||
"value": "Windows Print Spooler Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -224,13 +224,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35793",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35793",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35794",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.650",
|
||||
"lastModified": "2022-08-15T16:22:33.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:20.167",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-34702, CVE-2022-34714, CVE-2022-35745, CVE-2022-35752, CVE-2022-35753, CVE-2022-35766, CVE-2022-35767."
|
||||
"value": "Windows Secure Socket Tunneling Protocol (SSTP) Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -149,12 +149,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35794",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35794",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35795",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.707",
|
||||
"lastModified": "2022-08-15T15:52:51.410",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:20.277",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Error Reporting Service Elevation of Privilege Vulnerability."
|
||||
"value": "Windows Error Reporting Service Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -214,12 +214,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35795",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35795",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35796",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.767",
|
||||
"lastModified": "2022-08-30T12:36:27.113",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:20.370",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability."
|
||||
"value": "Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,19 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35796",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.gentoo.org/glsa/202208-35",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35796",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35797",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.823",
|
||||
"lastModified": "2022-08-15T15:16:46.807",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:20.533",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Windows Hello Security Feature Bypass Vulnerability."
|
||||
"value": "Windows Hello Security Feature Bypass Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -134,12 +134,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35797",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35797",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35799",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.883",
|
||||
"lastModified": "2022-08-12T16:27:05.737",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:20.627",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35799",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35799",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35800",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.937",
|
||||
"lastModified": "2022-08-12T16:26:48.170",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:20.723",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35800",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35800",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35801",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:13.993",
|
||||
"lastModified": "2022-08-12T16:26:19.610",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:20.823",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35802, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35801",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35801",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35802",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:14.093",
|
||||
"lastModified": "2022-08-12T16:28:55.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:20.913",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35807, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,7 +17,7 @@
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"source": "secure@microsoft.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -37,7 +37,7 @@
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "secure@microsoft.com",
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -90,12 +90,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35802",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35802",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35804",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:14.163",
|
||||
"lastModified": "2022-08-15T15:02:38.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:21.007",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SMB Client and Server Remote Code Execution Vulnerability."
|
||||
"value": "SMB Client and Server Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -74,13 +74,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35804",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35804",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35806",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:14.217",
|
||||
"lastModified": "2022-08-15T13:58:58.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:21.103",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability. This CVE ID is unique from CVE-2022-30175, CVE-2022-30176, CVE-2022-34687, CVE-2022-35773, CVE-2022-35779."
|
||||
"value": "Azure RTOS GUIX Studio Remote Code Execution Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -69,12 +69,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35806",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35806",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35807",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:14.273",
|
||||
"lastModified": "2022-08-12T16:08:18.423",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:21.190",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35808, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35807",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35807",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,12 +2,12 @@
|
||||
"id": "CVE-2022-35808",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2022-08-09T20:15:14.333",
|
||||
"lastModified": "2022-08-12T16:08:00.553",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2023-05-31T19:15:21.297",
|
||||
"vulnStatus": "Modified",
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-35774, CVE-2022-35775, CVE-2022-35780, CVE-2022-35781, CVE-2022-35782, CVE-2022-35783, CVE-2022-35784, CVE-2022-35785, CVE-2022-35786, CVE-2022-35787, CVE-2022-35788, CVE-2022-35789, CVE-2022-35790, CVE-2022-35791, CVE-2022-35799, CVE-2022-35800, CVE-2022-35801, CVE-2022-35802, CVE-2022-35807, CVE-2022-35809, CVE-2022-35810, CVE-2022-35811, CVE-2022-35812, CVE-2022-35813, CVE-2022-35814, CVE-2022-35815, CVE-2022-35816, CVE-2022-35817, CVE-2022-35818, CVE-2022-35819."
|
||||
"value": "Azure Site Recovery Elevation of Privilege Vulnerability"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -70,12 +70,8 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-35808",
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-35808",
|
||||
"source": "secure@microsoft.com"
|
||||
}
|
||||
]
|
||||
}
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user